Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4C51F766.5070405@banquise.net>
Date: Thu, 29 Jul 2010 23:49:26 +0200
From: Simon Marechal <simon@...quise.net>
To: john-users@...ts.openwall.com
Subject: Re: Contest Details - "Crack Me If You Can" - DEFCON
 2010

Le 29/07/2010 22:58, Solar Designer a écrit :
> Ouch.  Just to make your posting more valuable to all, does the above
> apply to current versions of EDPR as well? 

I didn't ask for a renewal of our license, so I don't know. That's why I
mentionned the fact it happened a couple of years ago. I however
wouldn't have high hopes as the tool was supposed to be mature back then.

> As to its speed, I guess it
> varies by hash type - so perhaps mention what you ran it against?
> I know that it's expected to be very slow at Unix crypt(3) hashes, but
> it shouldn't be that bad at LM/NTLM.

It looks like it good with some hashes, especially GPU supported ones.
It also has support of standard document formats that are not targetted
by JtR. But even if the speed was allright, you only had very basic
bruteforce modes.

As for "real" cracking sessions, the GUI was really horrible. In order
to crack some hashes, you had to :
* click new task
* select the file where your hashes are
* a list of all hashes pops up, select one
* start again for all other passwords

It created a job per hash, that had to be finished before running the
next. Not exactly useful.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.