Date: Wed, 13 Feb 2013 21:30:52 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: RAR Cracking with JtR Jumbo (Files found during forensics) On Wed, Feb 13, 2013 at 08:59:27PM +0400, Solar Designer wrote: > On Wed, Feb 13, 2013 at 11:52:57AM -0500, Rich Rumble wrote: > > I'm getting 150-160 c/s on 8 threads(omp) using a Cwgwin\win32 build (Intel > > Xeon E5620@...0GHz) > > c:\john-1.7.9-jumbo-7\run>john-omp.exe brulez.txt -format=rar -pot=rar.pot > > -w=rockyou.txt > > Loaded 3 password hashes with 3 different salts (RAR3 SHA-1 AES [32/32]) > > guesses: 0 time: 0:00:00:02 0.00% c/s: 150 trying: carolina - david > > guesses: 0 time: 0:00:00:04 0.00% c/s: 151 trying: alyssa - horses [...] > Anyhow, this run should complete in a little over 1 day. Perhaps you > can just keep it going? Correction: it'd take a little over 1 day when running on one salt. With 3 salts, it may take ~3.5 days. I recommend restarting on just one of the lines from brulez.txt (one salt), since the password on the three files is likely the same. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.