Date: Thu, 20 Dec 2012 02:56:12 +0100 From: newangels newangels <contact.newangels@...il.com> To: john-users@...ts.openwall.com Subject: Re: Mangling rules for different ciphers Thank you really appreciated, Regards, Don 2012/12/19, Simon Marechal <simon@...quise.net>: > Following my Passwords^12 presentation, I generated mangling rules for > different ciphers. This is just a test, downloadable there: > > http://www.banquise.net/bin/2012-12-19-mangling.tar.bz2 > > It contains the following files: > processWordlist - the time it takes (in seconds) to mangle a wordlist on > my computer > processtime - the time it takes (in seconds) to test a password against > a single salt with DES on my computer > > And the results: > result-des > result-des-us > result-fasthash > result-fasthash-us > result-slowhash > result-slowhash-us > > Files finishing without -us have been trained with the new sraveau > wikipedia wordlist, and rockyou. Those with a -us suffix have been > generated using the new sraveau wikipedia wordlist, limited to the US > keymap, and rockyou. > > The "des" files have been trained with the aforementioned parameters, > the "fasthash" for the case where mangling the wordlist takes much more > time than testing individual passwords, and "slowhash" for the case > where testing a single password takes much more time than mangling the > wordlist. > > It will probably need some fixing (removal of the performance values, > and probably fixing the [ and ]), but should perform well. I will bench > them ASAP. In the meanwhile, please let me know if this is useful to you. >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.