Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 27 Jun 2011 12:03:23 +0300
From: Martin T <m4rtntns@...il.com>
To: john-users@...ts.openwall.com
Cc: bartavelle@...il.com
Subject: Re: brute force attack of an Unix crypt

Bartavelle, I see. Now I understand what those "c/s" values are :) In
order to try all possibilities, it would take 226 years:

(95^8)/930000/3600/24/365

..and thus in average password should be cracked with 113 years using
my CPU. I stopped this cracking process :)


regards,
martin

2011/6/27 Bartavelle <bartavelle@...il.com>:
> On 27/06/2011 01:06, Martin T wrote:
>> [Incremental:All8]
>> File = /usr/share/john/all.chr
>> MinLen = 8
>> MaxLen = 8
>> CharCount = 95
>>
>> I remember that I really used letters, numbers and special
>> characters(8 characters in total) in order to generate this crypt
>> file. I even found the terminal where I started this command and if I
>> pressed enter few times, following was printed to the terminal:
>>
>> guesses: 0  time: 139:15:12:09  c/s: 930654  trying: l5rBse_N - l5rBsil$
>> guesses: 0  time: 141:15:32:12  c/s: 929241  trying: 1doccLl4 - 1doccLur
>> guesses: 0  time: 141:15:32:15  c/s: 929241  trying: 1dau4qf! - 1dau4qwp
>> guesses: 0  time: 141:15:34:21  c/s: 929241  trying: 1jeTL x8 - 1jeTL e#
>> guesses: 0  time: 141:18:48:12  c/s: 929072  trying: 2kageA3z - 2kageACs
>>
>> How much longer it might take to decrypt this Unix crypt?
>
> If all 95^8 passwords were tested, it would take at most 226 years to
> complete. However, -inc doesn't test all passwords, so it might never end.
>
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.