Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <0851DAEE-5320-4452-B84C-4170F230D910@erols.com>
Date: Tue, 4 Mar 2008 14:14:35 -0500
From: Erik Winkler <ewinkler@...ls.com>
To: john-users@...ts.openwall.com
Subject: Re: new MYSQL323 module


On Mar 4, 2008, at 5:27 AM, Bucsay Balázs wrote:

> Hello!
>
> Im tested in 1.7.2, and the old mysql was in 1.7.1-bp2.
>
> Results with linux-x86-sse2:
> John the Ripper password cracker, version 1.7.1-bp2
> Benchmarking: mysql [mysql]... DONE
> Raw:    1756K c/s real, 1756K c/s virtual
>
> Algoritm of mine:
> John the Ripper password cracker, version 1.7.2
> Benchmarking: MYSQL_fast [mysql-fast]... DONE
> Raw:    13873K c/s real, 13929K c/s virtual

I had similar results for MacOS X PowerPC running on 1.3 Ghz G4 laptop:

john-1.7.2 (all-patch-v9):
./john -test -format:mysql
Benchmarking: MYSQL [mysql]... DONE
Raw:	780184 c/s real, 851729 c/s virtual

/john -format:mysql mysqltest.txt
Loaded 2 password hashes with no different salts (MYSQL [mysql])
letmein          (root)
hackmee          (user)
guesses: 2  time: 0:00:15:45 (3)  c/s: 609988  trying: hackmee


john-1.7.2 (mysql-fast patch):

/john -test -format:mysql-fast
Benchmarking: MYSQL_fast [mysql-fast]... DONE
Raw:	8671K c/s real, 9385K c/s virtual

./john -format:mysql-fast mysqltest.txt
Loaded 2 password hashes with no different salts (MYSQL_fast [mysql- 
fast])
letmein          (root)
hackmee          (user)
guesses: 2  time: 0:00:01:37 (3)  c/s: 5893K  trying: hackme! - hackmux

The optimizations seem to provide at least a 10x improvement in  
speed.  Nice work!!

Erik

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.