Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 24 Jan 2024 14:14:16 +0100
From: Matthias Apitz <>
Subject: DES passwords not cracked within hours


I've used 'john' already in October 2022 to crack con success on DES
crypted passwords on SuSE Linux...

Now I have another use case and using the same installation 'john' is
unwilling to crack a single line password file in hours:

$ cat /tmp/passwd.des

$ cd ~/guru/john-1.9.0-jumbo-1/run
$ ./john /tmp/passwd.des
Using default input encoding: UTF-8
Loaded 1 password hash (descrypt, traditional crypt(3) [DES 256/256 AVX2])
Will run 4 OpenMP threads
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Warning: Only 783 candidates buffered for the current salt, minimum 1024 needed for performance.
Proceeding with wordlist:./password.lst, rules:Wordlist
Proceeding with incremental:ASCII
Warning: MaxLen = 13 is too large for the current hash type, reduced to 8

(pressed any key after minutes)

0g 0:00:04:51 0,00% 3/3 (ETA: 2036-12-10 21:44) 0g/s 16495Kp/s 16495Kc/s 16495KC/s kbgiega..kbg2hat

0g 0:00:07:32 0,00% 3/3 (ETA: 2036-09-20 05:23) 0g/s 16787Kp/s 16787Kc/s 16787KC/s c6ctbe..c6c9fz

What I do wrong?



Matthias Apitz, ✉, +49-176-38902045
Public GnuPG key:

I am not at war with Russia.  Я не воюю с Россией.
Ich bin nicht im Krieg mit Russland.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.