|
Message-ID: <20091228231619.GA15082@openwall.com> Date: Tue, 29 Dec 2009 02:16:19 +0300 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: JtR 1.7.4 and jumbo patch update On Mon, Dec 28, 2009 at 06:00:06PM -0500, Rich Rumble wrote: > 0-5 chars (LM) using default passwd.lst and un-commenting all rules in > john.conf (I am crazy) > on a Intel Core 2 Duo at 2.33Ghz takes under 3 minutes > > Loaded 23 password hashes with no different salts (LM DES [128/128 BS SSE2]) > PASSWOR (test:1) > AAA (test-4) > D (test:2) > EME (test:2) > guesses: 4 time: 0:00:00:01 (3) c/s: 5514K trying: SMPX - 2MPU > $!+V3 (test:2) > guesses: 5 time: 0:00:01:17 (3) c/s: 203350K trying: =R=S/ - =R=10 > guesses: 5 time: 0:00:02:51 (3) c/s: 213487K trying: |||`} - ||||} Yeah, that's about right, and you would probably get more passwords cracked during that time if you did not limit the length. As to you uncommenting the "crazy" rules, that's fine for very fast hashes like that, and it actually did not affect this run's duration - as we can see, it proceeded to "incremental" mode (shown as pass 3) after just one second. If you want to try the word mangling rules some more, you can run JtR with the jumbo patch like this: ./john -w=password.lst --rules=single pwdump-file Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.