|
Message-ID: <20101217053758.GD6958@openwall.com> Date: Fri, 17 Dec 2010 08:37:58 +0300 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: JtR/OpenMP against Gawker passwords On Thu, Dec 16, 2010 at 07:05:56PM +0100, bartavelle wrote: > On 12/15/2010 09:52 PM, Solar Designer wrote: > > Thus, > > a more efficient attack could be mounted on a large subset of the hashes > > (but a much smaller subset of the salts) by using the "--salts" option. > > There are three groups of salts according to my quick check : the > missing, the few (24 to 62 passwords per salt) and the common (157 to > 264 passwords per salt). > > There are way more "common" salts than the "few" ones ... Oh. Well, I over-estimated possible speedup from focusing on the "common" salts, then... Yet it could be done. Thanks, Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.