|
Message-ID: <20061015001456.GA1919@openwall.com> Date: Sun, 15 Oct 2006 04:14:56 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: MDCrack xnix - please try to not over-quote the next time you post. On Sun, Oct 15, 2006 at 12:27:16AM +0400, xnix wrote: > On raw-md5 you can try mdcrack. it is more faster Yes, MDCrack should be faster (in terms of hashes computed per second when used against a single MD5 hash) than the contributed JtR patch for raw MD5 hashes. However, MDCrack is likely to be less effective in practice if used on its own because it is much dumber than JtR in the way it generates candidate passwords to try. One possibility is to pipe the output of "john ... --stdout" into MDCrack. One downside of that approach is that if you interrupt and continue such a JtR + MDCrack run, some buffered candidate passwords (a few hundred is typical) will be skipped. Oh, and the URL for MDCrack is: http://mdcrack.openwall.net -- Alexander Peslyak <solar at openwall.com> GPG key ID: 5B341F15 fp: B3FB 63F4 D7A3 BCCC 6F6E FC55 A2FC 027C 5B34 1F15 http://www.openwall.com - bringing security into open computing environments -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.