You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
$ ../run/john --list=format-all-details --format=raw-md5
(...)
Max. keys per crypt 24576
$ ../run/john ../test/rawmd5_tst.in -form:raw-md5 -inc
Loaded 1500 password hashes with no different salts (Raw-MD5 [MD5 128/128 AVX 4x3])
Warning: poor OpenMP scalability for this hash type, consider --fork=8
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
12345 (u28-RawMD5)
start1 (u54-RawMD5)
2g 24576p 0:00:00:01 1.086g/s 13356p/s 13356c/s 20034KC/s 013356..breash
$ grep Cracked ../run/john.log
0:00:00:01 + Cracked u28-RawMD5 as candidate #0
0:00:00:01 + Cracked u54-RawMD5 as candidate #0
Both figures are sort of correct... both passwords were found somewhere between first and 24,576:th candidate.
Maybe we can actually produce a more exact figure while at it. At the time we call get_key(n) we obviously do know n...
The text was updated successfully, but these errors were encountered:
Using these non-default settings in john.conf:
Both figures are sort of correct... both passwords were found somewhere between first and 24,576:th candidate.
Maybe we can actually produce a more exact figure while at it. At the time we call get_key(n) we obviously do know n...
The text was updated successfully, but these errors were encountered: