|
Message-ID: <CAFMma9PCDuLthHof1E7r2kx7iBEOTqmRnXQuwrYbhoxWSHAQoA@mail.gmail.com> Date: Fri, 22 Nov 2013 11:24:39 -0600 From: Richard Miles <richard.k.miles@...glemail.com> To: john-users@...ts.openwall.com Subject: Re: Questions and suggestions to build a home cracking box. :) On Wed, Nov 20, 2013 at 9:46 PM, Solar Designer <solar@...nwall.com> wrote: > On Wed, Nov 20, 2013 at 08:07:15AM -0600, Richard Miles wrote: > > I will be cracking basically 95% of the time the following hashes:NTLMv2, > > netntlm, netntlmv2, MySQL (local hashes and network), MSSQL (local hashes > > and network), lotus, mscash and mscash2. > > Out of these, when using JtR you'd currently crack all but mscash2 on > CPU. mscash2 is slow enough to be efficient on GPU with current JtR > code (and it's actually on par with hashcat on GPU). The rest are way > too fast, so without on-GPU candidate password generation (which we > mostly don't have, with the exception below) there's no speedup from > using a GPU. > Yeah, I understood that there is a limitation until the moment. :~( Fingers crossed to have a solution during next months... > > As an exception Sayantan's bleeding-mask branch includes mask mode > support on GPU for some fast hashes. If you like, you may experiment > with this. It'd achieve reasonable GPU speeds for a few fast hash > types, but in mask mode only. > > I know mask mode very briefly, to say the true I know it exist because of hashcat, but I don't understand it very well. I found this post and I guess it's related: http://www.openwall.com/lists/john-dev/2013/06/15/1 Where can I find a good documentation explaining how mask mode works, advances in comparison with other modes, etc? Thanks. > Alexander >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.