|
Message-ID: <45627.128.173.192.90.1337800297.squirrel@webmail.tuffmail.net> Date: Wed, 23 May 2012 15:11:37 -0400 (EDT) From: "Brad Tilley" <brad@...ystems.com> To: "Solar Designer" <solar@...nwall.com> Cc: "Brad Tilley" <brad@...ystems.com>, john-dev@...ts.openwall.com Subject: Re: Brute Force TrueCrypt Headers > On Fri, Apr 13, 2012 at 11:04:02PM -0400, Brad Tilley wrote: >> Here is my source code: http://16s.us/TCHead/downloads/ >> >> Here is the FAQ: http://16s.us/TCHead/faq/ > > Here's another implementation, including some CUDA code: > > https://code.google.com/p/truecrack/ > > GPLv3, unfortunately. > > I learned of this one from: > > http://www.reddit.com/r/netsec/comments/u116n/truecrack_a_bruteforce_password_cracker_for/ > > The reported speed is only 15 passwords/second on a quad-core CPU. > Brad - how does this compare to your implementation's speed? > > Alexander Mine does about 50 passwords a second, but it's not optimized to crack passwords. I have a bit in the FAQ about that: http://16s.us/TCHead/faq/ A multi-threaded or multi-process attack should do more than that. Brad
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.