Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <91D0B62A2328924087649659387009F5861C86D4@EUMAILDAG2.eu.kaspersky.com>
Date: Wed, 13 Feb 2013 13:24:05 +0000
From: Nicolas Brulez <nicolas.Brulez@...persky.com>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: RE: RAR Cracking with JtR Jumbo (Files found during
 forensics)

Hello Dhiru,

I suppose i can try to contact him.
Thank you!

Nico

-- 
Best regards,

Nicolas Brulez | Malware Expert - Global Research and Analysis Team | Kaspersky Lab


-----Message d'origine-----
De : Dhiru Kholia [mailto:dhiru.kholia@...il.com] 
Envoyé : mercredi 13 février 2013 14:03
À : john-users@...ts.openwall.com
Objet : Re: [john-users] RAR Cracking with JtR Jumbo (Files found during forensics)

On Wed, Feb 13, 2013 at 4:38 PM, Nicolas Brulez
<nicolas.Brulez@...persky.com> wrote:
> While doing investigations, several RAR password protected SFX files were found on hundreds of machines.
>
> I have limited power for cracking password, and I tried "crark". Using my CPU I could only reach 245 c/s and my single GPU reached 1200 c/s.
> I have tried several things: Some simple wordlist, brute forcing only lowercase, numbers, low/upp/numb/special and i didn't find anything.
> I don't think the passwords are that complex, but the limited power I have probably did not help.

Maybe Jeremi Gosney (@jmgosney) can help with the computing power part.

-- 
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.