|
Message-ID: <4f445b980704231820y29bc8047u1ea78f21c64a0f9f@mail.gmail.com> Date: Mon, 23 Apr 2007 18:20:40 -0700 From: "Alain Espinosa" <alainesp@...il.com> To: john-users@...ts.openwall.com Subject: Re: JTR Vs PasswordPro There are a table with some performance of know programs who crack NTLM and MSCASH. Tested in "Real Mode" (not benchmark) and with varius options (different number of hashes, different sets of characters in bruteforce). The numbers are "average" of this options but not big difference are noted. (NTLM Test in Celeron D 2.66 GHz, EM64T capable, mode 32 bits): *Tools* *Speed (hashes / seg.) M = 1 000 000* MDCrack 1.82 (5) 13,7M* *My implementation* *9,0M* Cain y Abel 4.8 (1) 6,5M SamInside 2.8.0.0 (3) 5,5M LC5 (2) 5,0M LCP 5.04 (4) 4,9M *MDCrack only soport brute force method and load only one hash making it very unpractice. Besides John "incremental" is a more smart that MDCrack bruteforce. Numbers are with only one hash, but difference inter programs remain the same with more hashes. (MSCASH, Test in Celeron D 2.66 GHz, EM64T capable, mode 32 bits): *Tools* *Speed (hashes / seg.) M = 1 000 000* *My implementation* *4,5M* PasswordsPro 2.3.1.0 (3) 1,7M Cain y Abel 4.8 (1) 1,4M <http://www.openwall.com/john> References 1) http://www.oxid.it 2) http://www.atstake.com/lc <http://en.wikipedia.org/wiki/Lm_hash> 3) http://www.insidepro.com/ 4) http://www.lcpsoft.com/english/index.htm 5) http://mdcrack.openwall.net <http://www.securiteam.com/tools/5JP0I2KFPA.html>
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.