Date: Wed, 4 May 2016 12:46:36 +0530 From: Harssh Mahajan <harssh@...il.com> To: john-users@...ts.openwall.com Subject: Re: PBKDF2-SHA1 3DES/AES You could consider using large instances with per hour pricing on AWS https://aws.amazon.com/ec2/pricing/ for more power, alternate to purchasing hardware. To speed up computation, run tasks in parallel and/or on multiple instances, for varied lengths. E.g. - Same instance - Thread 1 for 6-8 length, Thread 2 for 8-10 length and so on. - Multiple instance - Instance 1 for 6-8 length, Instance 2 for 8-10 length and so on. On Wed, May 4, 2016 at 1:36 AM, Doc Case <drdrgmtn@...o.com> wrote: > Hi everyone, > > > > I'm a new user, and I'm a forensic consultant. This is my first time > cracking a password so complex. > > I need help breaking this one because I don't have enough power to obtain > anything in short time... A little background: > > > > in support of a litigation I've acquired an archive protected with system > in subject. I've extracted the hash with one of the community tool, and > with JTR i began trying all the standard modes: > > Single, dictionary, and incremental. > > I used the standard free wordlist (all.gz) and my linuxbox, with one GT970 > and openCL, works at 3500p/s - c/s - C/s. > > I reached three days straight of computational time, without any result. > > So, I suppose that this password is a good one. > > Anyway, I need it and i don't have any shortcut: no common words or ideas, > no info at all. > > All I have is brute force, if I don't go wrong. > > So I'm here asking for help: is there any way to speed up the work? Beside > buying 24 graphic cards tomorrow, I mean... > > > > Any help is really appreciated, > > > > Doc > > > > Sent using Zoho Mail > > > > > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.