Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20101217053758.GD6958@openwall.com>
Date: Fri, 17 Dec 2010 08:37:58 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: JtR/OpenMP against Gawker passwords

On Thu, Dec 16, 2010 at 07:05:56PM +0100, bartavelle wrote:
> On 12/15/2010 09:52 PM, Solar Designer wrote:
> > Thus,
> > a more efficient attack could be mounted on a large subset of the hashes
> > (but a much smaller subset of the salts) by using the "--salts" option.
> 
> There are three groups of salts according to my quick check : the
> missing, the few (24 to 62 passwords per salt) and the common (157 to
> 264 passwords per salt).
> 
> There are way more "common" salts than the "few" ones ...

Oh.  Well, I over-estimated possible speedup from focusing on the
"common" salts, then...  Yet it could be done.

Thanks,

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.