Date: Wed, 13 Feb 2013 20:40:56 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: RAR Cracking with JtR Jumbo (Files found during forensics) On Wed, Feb 13, 2013 at 04:34:57PM +0000, Nicolas Brulez wrote: > John the Ripper password cracker, ver: 1.7.9-jumbo-5_omp [win32-cygwin-x86-sse2i] Can you try with rar2john from latest bleeding-jumbo? You'd need to do a git clone of it, then build from source in Cygwin. ;-( Alternatively, you may share one of the RARs with me. ;-) magnum did this: Date: Tue Apr 3 23:12:07 2012 +0200 "Changed format tag from $rar3$ to $RAR3$ to enforce re-running rar2john." Perhaps there was a reason to "enforce re-running rar2john" (the newer version). > So i assume my 1200 c/s from crark was probably not accurate and my speed if even lower.. Not necessarily. Is your 1200 c/s based on crark's reporting while cracking one of these RARs, or on a separate benchmark run? > Who knows, we may be lucky ;) Have you already tested the entire RockYou list (~14M uniques) without rules? Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.