|
Message-ID: <4FD4BD73.6010309@banquise.net> Date: Sun, 10 Jun 2012 17:29:55 +0200 From: Simon Marechal <simon@...quise.net> To: john-users@...ts.openwall.com Subject: Re: JtR to process the LinkedIn hash dump On 06/10/2012 04:23 PM, Solar Designer wrote: > Some others have cracked more passwords, perhaps mostly by using GPUs - > @CrackMeIfYouCan reported over 4 million cracked after the first day - > yet 2 million is a fine number, and more importantly the blog post > details the approach, which I thought some john-users may find useful. This is not too hard to achieve. I started this morning the following tasks : * markov 300, length 24, default stats file (still running) * incremental (still running) * the sraveau wikipedia wordlist (still running) and a lame password list with these rules : https://github.com/bartavelle/rulesfinder/blob/master/results/2012-05-17-wikipedia-sraveau.rockyouunique.200 I did not bother recording precise statistics (as I will later on), but the wordlist alone might account for 75% of the findings. All of this on a single i7-3770 and I passed the 2.3M mark (about 8h). I suppose that somebody with a little bit of free time and good wordlists would crush this without GPUs. However, it will probably require very good lists, rules and hardware to beat @CrackMeIfYouCan.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.