Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 22 Nov 2013 11:24:39 -0600
From: Richard Miles <richard.k.miles@...glemail.com>
To: john-users@...ts.openwall.com
Subject: Re: Questions and suggestions to build a home cracking
 box. :)

On Wed, Nov 20, 2013 at 9:46 PM, Solar Designer <solar@...nwall.com> wrote:

> On Wed, Nov 20, 2013 at 08:07:15AM -0600, Richard Miles wrote:
> > I will be cracking basically 95% of the time the following hashes:NTLMv2,
> > netntlm, netntlmv2, MySQL (local hashes and network), MSSQL (local hashes
> > and network), lotus, mscash and mscash2.
>
> Out of these, when using JtR you'd currently crack all but mscash2 on
> CPU.  mscash2 is slow enough to be efficient on GPU with current JtR
> code (and it's actually on par with hashcat on GPU).  The rest are way
> too fast, so without on-GPU candidate password generation (which we
> mostly don't have, with the exception below) there's no speedup from
> using a GPU.
>

Yeah, I understood that there is a limitation until the moment. :~(

Fingers crossed to have a solution during next months...


>
> As an exception Sayantan's bleeding-mask branch includes mask mode
> support on GPU for some fast hashes.  If you like, you may experiment
> with this.  It'd achieve reasonable GPU speeds for a few fast hash
> types, but in mask mode only.
>
>
I know mask mode very briefly, to say the true I know it exist because of
hashcat, but I don't understand it very well. I found this post and I guess
it's related:

http://www.openwall.com/lists/john-dev/2013/06/15/1

Where can I find a good documentation explaining how mask mode works,
advances in comparison with other modes, etc?

Thanks.


> Alexander
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.