|
Message-ID: <20130716135703.GA8877@openwall.com> Date: Tue, 16 Jul 2013 17:57:03 +0400 From: Solar Designer <solar@...nwall.com> To: john-dev@...ts.openwall.com Subject: Re: Parallella: bcrypt On Tue, Jul 16, 2013 at 05:40:17PM +0400, Solar Designer wrote: > On Tue, Jul 16, 2013 at 03:12:02PM +0200, Katja Malvoni wrote: > > Self test - 822 c/s, with password.lst and pw-fake-unix 01:49:18, 820.9 > > c/s, 3059 password hashes cracked, 9531 left (Loaded 3107 password hashes > > with 3107 different salts) > > I just ran a quick test on the bsdicrypt hashes in the same file, and > got these same numbers above. These hashes are supposed to use the > exact same plaintexts that the bcrypt hashes use. So it looks like your > Parallella code is working right. :-) Cracked the bcrypt's as well: [...] kissa2 (u2271-bf) 3059g 0:00:13:44 100% 3.710g/s 4.300p/s 6589c/s 6589C/s haro..sss Use the "--show" option to display all of the cracked passwords reliably Session completed solar@...l:~/j/john-1.8.0/run$ ./john -sho pw-fake-unix | tail -1 3059 password hashes cracked, 9531 left This is on 4770K at stock clocks, running 8 OpenMP threads. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.