archive-info.com » INFO » O » OPENWALL.INFO

Total: 226

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Sample password hash encoding strings [Openwall Community Wiki]
    crypt How to retrieve and audit password hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page

    Original URL path: http://openwall.info/wiki/john/sample-hashes?do=backlink (2016-04-26)
    Open archived version from archive

  • Sample non-hashes (to be) supported by JtR [Openwall Community Wiki]
    and audit password hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page Archived ideas John the

    Original URL path: http://openwall.info/wiki/john/sample-non-hashes?do=backlink (2016-04-26)
    Open archived version from archive

  • How to produce test hashes for various formats [Openwall Community Wiki]
    and audit password hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page John the Ripper user

    Original URL path: http://openwall.info/wiki/john/Generating-test-hashes?do=backlink (2016-04-26)
    Open archived version from archive

  • John the ripper Test Suite [Openwall Community Wiki]
    hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page John the Ripper user community resources How

    Original URL path: http://openwall.info/wiki/john/test-suite?do=backlink (2016-04-26)
    Open archived version from archive

  • Parallel and distributed processing with John the Ripper [Openwall Community Wiki]
    password hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page John the Ripper user community resources

    Original URL path: http://openwall.info/wiki/john/parallelization?do=backlink (2016-04-26)
    Open archived version from archive

  • Markov generator [Openwall Community Wiki]
    a large sample of clear text passwords Its usage is calc stat p dictionnary file statfile mkvcalcproba This program takes a file with a password per line and a stats file as its input and outputs statistics about them as a tab separated output The columns are the password the details of the P calculation the value of P markov score the password length the position of the password if it was brute forced blindly the markov score of the password without the first two characters This program is of limited interest to most but will let you compute the strength of your passwords generate nice graphs to include in reports will be added soon genmkvpwd This program could be used to output passwords on stdout but is mainly useful for planning a cracking session Its syntax is genmkvpwd statfile max lvl max len start end With a given statfile it is mainly used in the following way genmkvpwd statfile 0 len gives for level between 100 and 350 the quantity of passwords whose maximum length in len and markov strength is or equal to level For example genmkvpwd stats 0 12 lvl 100 2424 Kb for nbparts 9846 possible passwords lvl 101 2448 Kb for nbparts 10 K possible passwords 10849 lvl 102 2472 Kb for nbparts 11 K possible passwords 11915 lvl 103 2496 Kb for nbparts 13 K possible passwords 13104 lvl 104 2520 Kb for nbparts 14 K possible passwords 14446 lvl 346 8328 Kb for nbparts 440023 G possible passwords 440023594138549 lvl 347 8352 Kb for nbparts 478482 G possible passwords 478482142956335 lvl 348 8376 Kb for nbparts 520144 G possible passwords 520144425218940 lvl 349 8400 Kb for nbparts 565264 G possible passwords 565264299077832 lvl 350 8424 Kb for nbparts 614114 G possible passwords 614114588006381 john mode The syntax of the new generator is markov level start end maxlen Here level correspond to the maximum markov strength of candidate passwords start to the first password to be generated default 0 end to the last default 0 0 meaning last password and maxlen to the maximum length of candidate passwords Real world usage example In this example two computers are available to the cracker a laptop with a 1 2Ghz Core 2 CPU with 2 cores a server with a 1 86Ghz Xeon CPU with 4 cores Password of length less than 12 will be tested against a single Raw MD5 hash during 24 hours Benchmarking against the target It is important to be able to benchmark against the passwords that are going to be tested time john markov 200 10000000 50000000 12 format raw md5 truc md5 Loaded 1 password hash Raw MD5 raw md5 SSE2 MKV start lvl 200 len 12 pwd 40000000 guesses 0 time 0 00 00 11 100 c s 3442K trying sinounol sinounot real 0m11 646s user 0m11 581s sys 0m0 008s The time command is more precise than john s output The actual speed is 40000000 11 646 3434655

    Original URL path: http://openwall.info/wiki/john/markov (2016-04-26)
    Open archived version from archive

  • John the Ripper GPU support [Openwall Community Wiki]
    password hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Markov generator Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page Archived ideas John the

    Original URL path: http://openwall.info/wiki/john/GPU?do=backlink (2016-04-26)
    Open archived version from archive

  • Custom builds of John the Ripper [Openwall Community Wiki]
    and audit password hashes from remote Linux servers Cracking WPA PSK WPA2 PSK with John the Ripper Procedure to add a new code page to john Cracking Mac OS X salted SHA 1 passwords Patches that have since been integrated into the official JtR Markov generator Welcome to the Openwall Community Wiki Backlinks This is a list of pages that seem to link back to the current page John the

    Original URL path: http://openwall.info/wiki/john/custom-builds?do=backlink (2016-04-26)
    Open archived version from archive



  •