Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 17 Aug 2013 12:20:08 -0400
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Help a newbie to crack a password

On Sat, Aug 17, 2013 at 11:45 AM, Victor <vbis@...reton.com> wrote:

> 10hours on my MBP 13" and it did not find it (was running at 6p/s, didn't
> have multi core)
>
> What are your specs Rich? And what did you write in terminal/console?
>
$ ./john-sse2i-omp.exe 7zip.txt -w=rockyou.txt -rules=single
Loaded 1 password hash (7z, 7-Zip [SHA256 32/32])
Will run 16 OpenMP threads

0g 0:00:00:01 0.00% 0g/s 56.73p/s 56.73c/s 56.73C/s daniela..patrick
0g 0:00:00:09 0.00% 0g/s 57.97p/s 57.97c/s 57.97C/s wilson..ganda
0g 0:00:00:52 0.00% 0g/s 57.26p/s 57.26c/s 57.26C/s blessing..love06
alohomora        (password.7z)
1g 0:00:04:12 0.00% 0.003961g/s 55.64p/s 55.64c/s 55.64C/s
liverpool07..jakers

About 1-2 minutes using the rockyou.txt wordlist and "single" mangling
rules built-in to jtr. Running 57 candidates per second when I had 16
threads at once. (I have two 8 core cpu xeon procs).
I'm not sure if 7z has false positives and keeps going because of that, or
it was because I was running omp, but the cracking continue for 3 minutes.
Here is my john.log
0:00:00:00 - Hash type: 7z, 7-Zip (lengths up to 125)
0:00:00:00 - Algorithm: SHA256 32/32
0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 16
0:00:00:00 Proceeding with wordlist mode
0:00:00:00 - Wordlist file: rockyou.txt
0:00:00:00 - 1081 preprocessed word mangling rules
0:00:00:00 - Rule #1: ':' accepted as ''
0:00:01:21 + Cracked password.7z: alohomora
0:00:04:12 Session aborted
-rich

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.