Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <9700674905c17d5db886a69d913bb404@smtp.hushmail.com>
Date: Fri, 25 May 2012 01:59:43 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: OpenCL crypt-sha512 (was: john-users: Can Excessive Rounds make Password
 cracking Infeasable)

On 05/25/2012 12:25 AM, magnum wrote:
> On 05/24/2012 11:03 PM, Solar Designer wrote:
>> On Thu, May 24, 2012 at 10:49:41PM +0200, magnum wrote:
>>> FWIW, some very quick tests on Solar's test gear with the hash above:
>>>
>>> CPU (8 cores): 4.75 c/s
>>> GTX580: 4300 c/s
>>> HD7970: 6000 c/s
>>>
>> These GPU speeds are not realistic.  There must be a bug or just lack of
>> support for non-default numbers of iterations for this hash type (this
>> is something for us to correct if so!)

Claudio,

Your format has some problems with cracking real hashes, even though it
passes self-tests.

Here's a way to make any number of test hashes:

$ for i in `../run/john -inc -stdout | head -10000 | shuf | head -20`;
do echo $i | mkpasswd -m sha-512 -P 0 ; done > testhashes

All should be cracked quickly using incremental mode. You can also add
-R <rounds> to mkpasswd, but the problem is not really with rounds but
with salts (it seems). You can set a fixed salt with -S, I tried
attacking only one or a few salts and 100% was cracked.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.