|
Message-ID: <20101116233217.GB23967@openwall.com> Date: Wed, 17 Nov 2010 02:32:17 +0300 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Amazon E2C GPU Cracking Brad, On Mon, Nov 15, 2010 at 08:00:42PM -0500, Brad Tilley wrote: > I thought John users may find this interesting (especially considering > the recent OpenCL patches): > > http://stacksmashing.net/2010/11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances/ Yes, I do find it interesting. This is probably not of much use for those using JtR during penetration tests - it would not be great to upload a client's password hashes to Amazon(*) - but it may be useful for development testing and during contests. (*) There's actually a way to deal with the issue of "revealing" hashes to the computing nodes - partial hashes may be uploaded, and false positives weeded out on one's own trusted computers. With fast to compute hashes truncated to a sufficient-for-security extent this might bump into the available bandwidth, but for very slow hashes this will work very well. This is an idea I've been toying with in the distributed processing context before... something to implement "when I have time." Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.