Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <441E8597.8020809@gmail.com>
Date: Mon, 20 Mar 2006 10:36:07 +0000
From: Hari Sekhon <harisekhon@...il.com>
To:  john-users@...ts.openwall.com
Subject: getting cracking speed info with nohup

When running nohup ./john passwdfile &, how can I found out the speed of 
the cracking the way you can when you just run ./john passwdfile and 
press enter to see what it is trying and how many combinations a second 
is is doing..?

I'm interested because I'm running hashes on two machines, a lame Via 
1Ghz and my own Athlon XP 2200.



Solar Designer wrote:
> On Wed, Mar 15, 2006 at 09:19:30AM +0000, Hari Sekhon wrote:
>   
>> I find that john --show passwdfile works best.
>>     
>
> This is what you're supposed to be using.  In fact, it's the only
> documented way to obtain the cracked passwords.
>
>   
>> The john.pot and john.log 
>> don't give useful information pairings of username/passwords. john.pot 
>> holds passwords and hashes, which is fine to look at if the username is 
>> the same as the password but a bit of a guessing game otherwise...
>>     
>
> john.pot is a file that John uses internally.  It is machine-friendly,
> not human-friendly.  "john --show" may also display more cracked users
> (e.g., if the same password hash is shared for several users, john.pot
> may have it listed only once, but "john --show" will display the
> password for all of the affected users) and it will combine any partial
> hashes (those are stored in john.pot on separate lines).
>
> The output of John while it is running may also not include all of the
> cracked passwords, so you should not be relying on it for that.  In
> particular, this may happen when the same password hash is shared for
> multiple users and you're running John in other than "single crack" or
> batch modes.  In those cases, John would simply not load the duplicate
> instances of the hash for cracking - yet a subsequent "john --show" run
> would correctly display all of the users whose passwords get cracked.
>
>   
>> Ps. It would be better if john sent it's output as it's going along the 
>> same way that most unix programs do
>>     
>
> Actually, John works _exactly_ the same way that most other Unix
> programs do.  This buffering of program output is performed by most C
> libraries, and programs have to explicitly ask the library to not buffer
> their output or to line-buffer it (instead of buffering fixed amounts of
> data) if they want to.  Most programs don't change the default.
>
> Maybe John should be explicitly line-buffering its standard output,
> although that would slow things down in those special cases when John
> produces a lot of output (successfully cracking thousands of passwords
> per second).
>
>   
>> so that I could do
>>
>> ./john passwdfile > john.progressfile 2>&1 &
>>
>> and then just tail -f the john.progressfile. Or even better to nohup 
>> john and then you could log off/close ssh session etc and ssh back into 
>> it some time/days later and do the tail -f...
>>     
>
> This has already been suggested: use GNU screen.
>
> You do need to use "john --show" to get at the actual cracked passwords
> anyway.
>
>   

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.