Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANnLRdjc7j+EWyZPMfJRkd0dvaNkaS_oLEdAmuzC5H3dyahJ+Q@mail.gmail.com>
Date: Wed, 24 Jan 2024 08:51:26 -0500
From: Stephen John Smoogen <smooge@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: DES passwords not cracked within hours

On Wed, 24 Jan 2024 at 08:29, Matthias Apitz <guru@...xarea.de> wrote:

>
> Hello,
>
> I've used 'john' already in October 2022 to crack con success on DES
> crypted passwords on SuSE Linux...
>
> Now I have another use case and using the same installation 'john' is
> unwilling to crack a single line password file in hours:
>
> $ cat /tmp/passwd.des
> john:aAxxxxxxxxxxx
>
>
It is going to take a while on a 4 threaded system. When I have done this
in the past, the way to 'speed' up checks is write specific incremental
rule sets to run against with things like a DES6 with minlength of 0 and
max length of 6 and then a DES7 which only checks 7 letter characters and
then one for 8. The DES6 and DES7 ran about the same time length (~ 1 day I
think), and the DES8 was going to be 96 days (since it is going to be 96
characters ).

Doing it this way focuses the attacks and stops it checking say 6 letter
characters (like the data below shows) when you know that the password had
to be 8 letters long because of a rule.




> $ cd ~/guru/john-1.9.0-jumbo-1/run
> $ ./john /tmp/passwd.des
> Using default input encoding: UTF-8
> Loaded 1 password hash (descrypt, traditional crypt(3) [DES 256/256 AVX2])
> Will run 4 OpenMP threads
> Proceeding with single, rules:Single
> Press 'q' or Ctrl-C to abort, almost any other key for status
> Almost done: Processing the remaining buffered candidate passwords, if any.
> Warning: Only 783 candidates buffered for the current salt, minimum 1024
> needed for performance.
> Proceeding with wordlist:./password.lst, rules:Wordlist
> Proceeding with incremental:ASCII
> Warning: MaxLen = 13 is too large for the current hash type, reduced to 8
>
> (pressed any key after minutes)
>
> 0g 0:00:04:51 0,00% 3/3 (ETA: 2036-12-10 21:44) 0g/s 16495Kp/s 16495Kc/s
> 16495KC/s kbgiega..kbg2hat
>
> 0g 0:00:07:32 0,00% 3/3 (ETA: 2036-09-20 05:23) 0g/s 16787Kp/s 16787Kc/s
> 16787KC/s c6ctbe..c6c9fz
>
> What I do wrong?
>
> Thanks
>
>         matthias
>
>
> --
> Matthias Apitz, ✉ guru@...xarea.de, http://www.unixarea.de/
> +49-176-38902045
> Public GnuPG key: http://www.unixarea.de/key.pub
>
> I am not at war with Russia.  Я не воюю с Россией.
> Ich bin nicht im Krieg mit Russland.
>


-- 
Stephen J Smoogen.
Let us be kind to one another, for most of us are fighting a hard battle.
-- Ian MacClaren

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.