Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Feb 2013 20:40:56 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: RAR Cracking with JtR Jumbo (Files found during forensics)

On Wed, Feb 13, 2013 at 04:34:57PM +0000, Nicolas Brulez wrote:
> John the Ripper password cracker, ver: 1.7.9-jumbo-5_omp [win32-cygwin-x86-sse2i]

Can you try with rar2john from latest bleeding-jumbo?  You'd need to do
a git clone of it, then build from source in Cygwin. ;-(  Alternatively,
you may share one of the RARs with me. ;-)

magnum did this:

Date:   Tue Apr 3 23:12:07 2012 +0200

"Changed format tag from $rar3$ to $RAR3$ to enforce re-running rar2john."

Perhaps there was a reason to "enforce re-running rar2john" (the newer
version).

> So i assume my 1200 c/s from crark was probably not accurate and my speed if even lower..

Not necessarily.  Is your 1200 c/s based on crark's reporting while
cracking one of these RARs, or on a separate benchmark run?

> Who knows, we may be lucky ;)

Have you already tested the entire RockYou list (~14M uniques) without
rules?

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.