Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <e5e93852-4a08-4df7-91ea-3bd86e9055c7@jeffunit.com>
Date: Wed, 14 Aug 2024 20:44:31 -0700
From: jeff <jeff@...funit.com>
To: john-users@...ts.openwall.com
Subject: problem running out of memory - john 20240608.1

I am using Bleeding john 20240608.1
I have quite a lot of NTLM hashes. I have broken them up into files of 
about 1 gigabyte each.
I start up john:

K:\password-cracking\john_bleeding_2024_0608.1\run>john.exe --format=LM 
--fork=60 \password-cracking\pwnedpasswords_ntlm.rawest.xaa
Using default input encoding: UTF-8
Using default target encoding: CP850
Loaded 62433618 password hashes with no different salts (LM [DES 256/256 
AVX2])
Will run 2 OpenMP threads per process (120 total across 60 processes)
Node numbers 1-60 of 60 (fork)
3 0g 0:00:00:13 DONE 2/3 (2024-08-14 20:34) 0g/s 565582p/s 565582c/s 
35311GC/s GFZEYAD..GFVIN14
2 0g 0:00:00:17 DONE 2/3 (2024-08-14 20:34) 0g/s 846973p/s 846973c/s 
52879GC/s 63511BG..TG1943
4 0g 0:00:00:15 DONE 2/3 (2024-08-14 20:34) 0g/s 670638p/s 670638c/s 
41870GC/s GLAY694..KNIP694
5 0g 0:00:00:15 DONE 2/3 (2024-08-14 20:34) 0g/s 704922p/s 704922c/s 
44010GC/s 24735YE..99161YE
6 0g 0:00:00:16 DONE 2/3 (2024-08-14 20:34) 0g/s 722324p/s 722324c/s 
45097GC/s VYGUNZ0..VYVIN14
3: Disabling duplicate candidate password suppressor
2: Disabling duplicate candidate password suppressor
7 0g 0:00:00:16 DONE 2/3 (2024-08-14 20:34) 0g/s 799612p/s 799612c/s 
49922GC/s TANINDL..99161DL
4: Disabling duplicate candidate password suppressor
8 0g 0:00:00:17 DONE 2/3 (2024-08-14 20:34) 0g/s 824012p/s 824012c/s 
51446GC/s HOLABI2..YOUKIS2
5: Disabling duplicate candidate password suppressor
9 0g 0:00:00:17 DONE 2/3 (2024-08-14 20:34) 0g/s 623657p/s 623657c/s 
38937GC/s GWCOXIC..GWVIN14
10 0g 0:00:00:16 DONE 2/3 (2024-08-14 20:34) 0g/s 696584p/s 696584c/s 
43490GC/s 64150IG..99161IG
11 0g 0:00:00:15 DONE 2/3 (2024-08-14 20:34) 0g/s 500803p/s 500803c/s 
31266GC/s 26731AX..99161AX
       0 [main] john-avx2-omp (23768) 
K:\password-cracking\john_bleeding_2024_0608.1\run\john-avx2-omp.exe: 
*** fatal error in forked process - MEM_COMMIT failed, Win32 error 1455
       0 [main] john 883 dofork: child -1 - forked process 23768 died 
unexpectedly, retry 0, exit code 0x100, errno 11
1: fork: 6Resource temporarily unavailable:
Disabling duplicate candidate password suppressor

This is on a microsoft winfows 10 system. I am watching the task 
manager, and the memory usage goes to about 110gbytes (I have 128gbytes 
of ram).
This is on a 64 core AMD epyc milan system.
If I need to break up the password file into smaller sections, I can do 
that. I tried files of about 300 mbytes and that also seemed to run out 
of memory.
Please help me find a path forward. I have a total of about 30 gigabytes 
of NTLM hashes I wish to process.

jeff

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.