|
Message-ID: <3648012.uX076jMgMJ@darkstar>
Date: Sat, 27 Apr 2013 15:08:05 +0400
From: "Sergey V." <sftp.mtuci@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: revised incremental mode and charset files (was: Bleeding-jumbo branch updated from core)
On 2013-04-27 at 05:00:26, Solar Designer <solar@...nwall.com> wrote:
> Also, can you (or/and anyone else) test interrupting/restoring with the
> new incremental mode? Make sure it cracks the same passwords as a
> non-interrupted session would. Make sure it doesn't take significantly
> more time than a non-interrupted session would. 1 second lost per
> interrupt/restore is OK, more is suspicious.
I did some short test from fresh git unstable branch (commit fc8c9fd7). Seems
new incremental mode works fine.
I generated new charset:
$ ./john --pot=../pots/john.pot --make-charset=../chrs/test.chr
Loaded 240928 plaintexts
Remaining 240927 plaintexts
Generating charsets........................ DONE
Generating cracking order..-------+-----------------+----+--------------------------+-- Stable order (62 recalculations)
Successfully wrote charset file: ../chrs/test.chr (159 characters)
For fast test i set small length and CharCount:
[Incremental:test]
File = $JOHN/../chrs/test.chr
MinLen = 7
MaxLen = 8
CharCount = 12
Non-interrupted session:
$ ./john --format=raw-md5 --pot=w-o_interrupt.pot --incremental=test --encoding=cp1251 ../hashes/md5
...
guesses: 22131 time: 0:00:00:26 0.00% c/s: 1759G trying: dr411701 - dr411717
guesses: 23055 time: 0:00:00:37 0.00% c/s: 1827G trying: 26350193 - 26350175
guesses: 25145 time: 0:00:01:06 0.00% c/s: 1885G trying: kookyyjr - kookyyjl
...
guesses: 25770 time: 0:00:01:14 DONE (2013-04-27 14:32:58) c/s: 1882G trying: glbo60-- - glbo60-D
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
With interrupt and restore:
$ ./john --format=raw-md5 --pot=w_interrupt.pot --incremental=test --encoding=cp1251 ../hashes/md5
...
guesses: 21717 time: 0:00:00:23 0.00% c/s: 1809G trying: 05183923 - 05183055
...
guesses: 21811 time: 0:00:00:25 0.00% c/s: 1756G trying: mccciked - mcccingf
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
Session aborted
$ ./john --restore
...
guesses: 23066 time: 0:00:00:38 0.00% c/s: 1797G trying: 04-97444 - 04-97478
guesses: 25336 time: 0:00:01:10 0.00% c/s: 1863G trying: gepe,z8m - gepe,z43
guesses: 25770 time: 0:00:01:16 DONE (2013-04-27 14:37:39) c/s: 1833G trying: glbo60-1 - glbo60-D
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
With interrupt it takes 2 seconds more, may be due machine is under other desktop load.
Cracks the same:
$ cmp -u w-o_interrupt.pot w_interrupt.pot
$
Should I do test more long sessions (with more big MaxLen and CharCount)?
Also, progress indicator is always shows 0:00%, it is correct?
Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.