|
Message-ID: <91D0B62A2328924087649659387009F5861C86D4@EUMAILDAG2.eu.kaspersky.com> Date: Wed, 13 Feb 2013 13:24:05 +0000 From: Nicolas Brulez <nicolas.Brulez@...persky.com> To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com> Subject: RE: RAR Cracking with JtR Jumbo (Files found during forensics) Hello Dhiru, I suppose i can try to contact him. Thank you! Nico -- Best regards, Nicolas Brulez | Malware Expert - Global Research and Analysis Team | Kaspersky Lab -----Message d'origine----- De : Dhiru Kholia [mailto:dhiru.kholia@...il.com] Envoyé : mercredi 13 février 2013 14:03 À : john-users@...ts.openwall.com Objet : Re: [john-users] RAR Cracking with JtR Jumbo (Files found during forensics) On Wed, Feb 13, 2013 at 4:38 PM, Nicolas Brulez <nicolas.Brulez@...persky.com> wrote: > While doing investigations, several RAR password protected SFX files were found on hundreds of machines. > > I have limited power for cracking password, and I tried "crark". Using my CPU I could only reach 245 c/s and my single GPU reached 1200 c/s. > I have tried several things: Some simple wordlist, brute forcing only lowercase, numbers, low/upp/numb/special and i didn't find anything. > I don't think the passwords are that complex, but the limited power I have probably did not help. Maybe Jeremi Gosney (@jmgosney) can help with the computing power part. -- Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.