The famous password cracker John The Ripper
has just been updated to version 1.7.9 jumbo 7 featuring integrated GPU
support using CUDA or OpenCL for a subset of hash and non-hash types.
The new release supports a large number of additional hashes including
Master Passwords for Mozilla based programs like Firefox or thunderbird,
ODF files, KeePass 1.x files, WPA-PSK encryption, Office 2007 and 2010
password protected documents, and Rar -p mode encrypted archives. The
full list of hashes and non-hashes that have been added to the program
is available on this page
John The Ripper is available for Windows, Linux and Mac OS X, the latest release currently only for Unix-based systems. Unofficial builds for Windows and Mac OS X are available that include several of the new features.
Benchmarks conducted by the team indicate performance gains for many operations when the gpu is utilized. There is however no definitive answer on how much faster the new version of John the Ripper is in comparison to previous versions, as it depends largely on the functions used.
Source: http://www.ghacks.net/2012/07/04/password-cracker-john-the-ripper-updated-integrated-gpu-support/
John The Ripper is available for Windows, Linux and Mac OS X, the latest release currently only for Unix-based systems. Unofficial builds for Windows and Mac OS X are available that include several of the new features.
Benchmarks conducted by the team indicate performance gains for many operations when the gpu is utilized. There is however no definitive answer on how much faster the new version of John the Ripper is in comparison to previous versions, as it depends largely on the functions used.
New users find examples, wordlists and everything else that is needed to get started with John The Ripper on the official website.For the rest, the maximum speedup is 6.13x for SSH, which is great (considering that the CPU clock rate reduces with more threads running, and that this is a 4-module CPU rather than a true 8-core). Here are the top 10 OpenMP performers (excluding SIP): Ratio: 6.13093 real, 0.77210 virtual SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key):Raw Ratio: 6.05882 real, 0.75737 virtual NTLMv2 C/R MD4 HMAC-MD5:Many salts Ratio: 6.04342 real, 0.75548 virtual LMv2 C/R MD4 HMAC-MD5:Many salts Ratio: 5.92830 real, 0.74108 virtual GOST R 34.11-94:Raw Ratio: 5.81605 real, 0.73986 virtual sha256crypt (rounds=5000):Raw Ratio: 5.65289 real, 0.70523 virtual sha512crypt (rounds=5000):Raw Ratio: 5.63333 real, 0.72034 virtual Drupal 7 $S$ SHA-512 (x16385):Raw Ratio: 5.56435 real, 0.69937 virtual OpenBSD Blowfish (x32):Raw Ratio: 5.50484 real, 0.69682 virtual Password Safe SHA-256:Raw Ratio: 5.49613 real, 0.68814 virtual Sybase ASE salted SHA-256:Many salts
Source: http://www.ghacks.net/2012/07/04/password-cracker-john-the-ripper-updated-integrated-gpu-support/
No comments:
Post a Comment