Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BLU0-SMTP1155B8408BB19EDF5C67A61FDE50@phx.gbl>
Date: Fri, 29 Jun 2012 13:55:27 +0200
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: Re: For some dynamic formats on linux-x86-mmx build cracking
 depends on password candidate sequence

On 06/29/2012 01:33 PM, Frank Dittrich wrote:
> $ cd test
> $ mv pw.dic pw.dic.orig
> $ LC_ALL=C tac pw.dic.orig > pw.dic
> 
> $ sha1sum pw.dic.orig pw.dic
> 71e6e0bb9c766c2030730ee1effde079b9fb1222  pw.dic.orig
> ee862671a9c34fc76b863670782b3959d0319caa  pw.dic
> 
> $ ./jtrts.pl -q dynamic
> -------------------------------------------------------------------------------
> - JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim
> Fougeron & others
> - Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6
> [linux-x86-mmx]
> --------------------------------------------------------------------------------
> form=dynamic_2                    guesses: 1496 time: 0:00:00:00 :
> Expected count(s) (1500)  [!!!FAILED!!!]

I forgot to mention that this test used to pass for jumbo-6.

All affected formats use a sequence of either
md5(md5($p))
or
md5(md4($p))


For the new clang target, I get the same problem, just fewer guesses
than for mmx.

$ ./jtrts.pl dynamic -q
-------------------------------------------------------------------------------
- JtR-TestSuite (jtrts). Version 1.12.4, June 22, 2012.  By, Jim
Fougeron & others
- Testing:  John the Ripper password cracker, ver: 1.7.9-jumbo-6
[linux-x86-clang]
--------------------------------------------------------------------------------
form=dynamic_2                    guesses: 1482 time: 0:00:00:00 :
Expected count(s) (1500)  [!!!FAILED!!!]
form=dynamic_2-raw                guesses: 1482 time: 0:00:00:00 :
Expected count(s) (1500)  [!!!FAILED!!!]
form=dynamic_3                    guesses: 1482 time: 0:00:00:00 :
Expected count(s) (1500)  [!!!FAILED!!!]
form=dynamic_3-raw                guesses: 1482 time: 0:00:00:00 :
Expected count(s) (1500)  [!!!FAILED!!!]
form=dynamic_34                   guesses: 1482 time: 0:00:00:00 :
Expected count(s) (1500)  [!!!FAILED!!!]
Some tests had Errors. Performed 42 tests.5 errors
Time used was 138 seconds



$ ../run/john -ses=./tst -nolog -pot=./tst.pot dynamic_2_tst.in
--wordlist=pw.dic
Loaded 1500 password hashes with no different salts (dynamic_2:
md5(md5($p)) (e107) [128/128 SSE2 intrinsics 8x4x4])
Remaining 18 password hashes with no different salts
guesses: 0  time: 0:00:00:00 DONE (Fri Jun 29 13:54:38 2012)  c/s:
698160  trying: limiey - Skippin� an�*

$ ../run/john -ses=./tst -nolog -pot=./tst.pot dynamic_2_tst.in
--wordlist=pw.dic.orig
Loaded 1500 password hashes with no different salts (dynamic_2:
md5(md5($p)) (e107) [128/128 SSE2 intrinsics 8x4x4])
Remaining 18 password hashes with no different salts
let�ein          (u46-dynamic_2)
swordfish        (u47-dynamic_2)
limiey           (u48-dynamic_2)
jus�m�size       (u168-dynamic_2)
out�eft          (u169-dynamic_2)
hhello__1        (u170-dynamic_2)
gobble__3        (u292-dynamic_2)
summer__3        (u293-dynamic_2)
pentium__4       (u405-dynamic_2)
PIII__4          (u406-dynamic_2)
�utle�t__1       (u407-dynamic_2)
characters__5    (u532-dynamic_2)
good to KN0W__5  (u533-dynamic_2)
asdfasfga__7     (u658-dynamic_2)
flasjkdfw__7     (u659-dynamic_2)
Sword��sh__3     (u778-dynamic_2)
�word�ish__3     (u779-dynamic_2)
HookFish__10     (u905-dynamic_2)
guesses: 18  time: 0:00:00:00 DONE (Fri Jun 29 13:55:01 2012)  c/s:
47831  trying: inkjet__9 - qwerty__11
Use the "--show" option to display all of the cracked passwords reliably

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.