Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20111119174319.GA2684@openwall.com>
Date: Sat, 19 Nov 2011 21:43:19 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Cloud instances and Cisco 7

On Sat, Nov 19, 2011 at 12:19:14PM -0500, Philippe Ouellet wrote:
> Sorry my mistake.. I said type type 7 and I meant type 5.

So you are asking two questions:

1. Why your "type 5" password cracked with John does not let you
actually ssh in to the device.

2. How to crack those "type 5" hashes faster, with a "cloud".

Right?

We can't really answer #1.  We can only guess.  My guess is that your
copy of the config file might not match the config actually on the
device or/and that the device might have other access control mechanisms
configured.  An incorrectly cracked password is not likely (would be a
bug in John, and there's no known bug like that).

As to #2, you need to provide more detail on the equipment or whatever
else you'd like to use.  That said, latest -jumbo includes OpenMP
parallelization for these hashes, which you may make use of.  This gives
me 215k c/s on an 8-core (dual Xeon E5420 2.5 GHz).  These hashes are
also supported with CUDA and OpenCL patches on the wiki:

http://openwall.info/wiki/john/GPU

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.