Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx01W+tkHmEKYSOGrLmiZxShU_0_CEyUALF_YPnxqQ1NsrQ@mail.gmail.com>
Date: Wed, 13 Feb 2013 11:52:57 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: RAR Cracking with JtR Jumbo (Files found during forensics)

On Wed, Feb 13, 2013 at 11:40 AM, Solar Designer <solar@...nwall.com> wrote:

> Not necessarily.  Is your 1200 c/s based on crark's reporting while
> cracking one of these RARs, or on a separate benchmark run?
>  > Who knows, we may be lucky ;)
> Have you already tested the entire RockYou list (~14M uniques) without
> rules?
>
I'm getting 150-160 c/s on 8 threads(omp) using a Cwgwin\win32 build (Intel
Xeon E5620@...0GHz)
c:\john-1.7.9-jumbo-7\run>john-omp.exe brulez.txt -format=rar -pot=rar.pot
-w=rockyou.txt
Loaded 3 password hashes with 3 different salts (RAR3 SHA-1 AES [32/32])
guesses: 0  time: 0:00:00:02 0.00%  c/s: 150  trying: carolina - david
guesses: 0  time: 0:00:00:04 0.00%  c/s: 151  trying: alyssa - horses
I've got more resources to throw around, but if the nature of the password
is unknown, at these speeds I don't know if it will help.
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.