Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20131101091349.GA4720@openwall.com>
Date: Fri, 1 Nov 2013 13:13:49 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Fwd: pdf password cracking with john

On Fri, Nov 01, 2013 at 08:43:24AM +0530, Akshar Kanak wrote:
>    I am trying to recover password from PDF . Looks like john (jumbo latest
> version)
>    is not supporting multiprocessing for pdf password cracking .

If by "latest version" you mean the latest numbered release, then yes -
1.7.9-jumbo-7 did not have OpenMP parallelization for PDF yet.  Here's a
list of OpenMP-enabled formats in the (older) jumbo versions:

http://openwall.info/wiki/john/parallelization#Built-in-parallelization-with-OpenMP

OpenMP parallelization for PDF is present (at least) in bleeding-jumbo:

https://github.com/magnumripper/JohnTheRipper/tarball/bleeding-jumbo

[solar@...er run]$ ./john -te -form=pdf
Will run 32 OpenMP threads
Benchmarking: PDF [MD5 SHA2 RC4/AES 32/64]... (32xOMP) DONE
Many salts:     1112K c/s real, 34784 c/s virtual
Only one salt:  1085K c/s real, 33973 c/s virtual

Note that in bleeding-jumbo you may also use --fork.  Try both approaches
and use whichever works better for you.

> I used the following format .
>    1) Used  pdf2john to get the format which john can under stand.
>    2) Then did export OMP_NUM_THREADS=4
>    3)  Then executed john on the format .
> 
> when I try to find out the number of john threads which are getting
> executed using the ps command , it shows only one .

Note that you need to build JtR with OpenMP support (uncomment the
OMPFLAGS line in the Makefile, as the README says), but you usually
do not need to specify OMP_NUM_THREADS (except e.g. on Solaris).

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.