Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130716135703.GA8877@openwall.com>
Date: Tue, 16 Jul 2013 17:57:03 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: Re: Parallella: bcrypt

On Tue, Jul 16, 2013 at 05:40:17PM +0400, Solar Designer wrote:
> On Tue, Jul 16, 2013 at 03:12:02PM +0200, Katja Malvoni wrote:
> > Self test - 822 c/s, with password.lst and pw-fake-unix 01:49:18, 820.9
> > c/s, 3059 password hashes cracked, 9531 left (Loaded 3107 password hashes
> > with 3107 different salts)
> 
> I just ran a quick test on the bsdicrypt hashes in the same file, and
> got these same numbers above.  These hashes are supposed to use the
> exact same plaintexts that the bcrypt hashes use.  So it looks like your
> Parallella code is working right. :-)

Cracked the bcrypt's as well:

[...]
kissa2           (u2271-bf)
3059g 0:00:13:44 100% 3.710g/s 4.300p/s 6589c/s 6589C/s haro..sss
Use the "--show" option to display all of the cracked passwords reliably
Session completed
solar@...l:~/j/john-1.8.0/run$ ./john -sho pw-fake-unix | tail -1
3059 password hashes cracked, 9531 left

This is on 4770K at stock clocks, running 8 OpenMP threads.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.