On 3/8/2014 12:31 AM, Rory O'Farrell wrote:
or could he choose to decrypt one (small, therefore hopefully fast)
file and recover the password?
File size is virtually irrelevant, when it comes to how fast the
password can be determined.
I'm surprised it only took 77 hours of CPU time.
Am 11.03.2014 22:02, schrieb Rob Weir:
Do you have a sense for what your average rate was, passwords/second,
with your configuration?
Node 4 reported 921c/s
klaus
Freundliche Grüße
--
Klaus Muth
HAGOS eG Industriestr. 62 fon: (+49) 711 78805-7086
EDV-Programmierung
The cleartext password is revealed. The cracking process does not depend on
the ODF file size, first step of cracking is extracting a password hash from
the ODF file.
Am 08.03.2014 09:31, schrieb Rory O'Farrell:
On Sat, 08 Mar 2014 07:46:06 +0100
Klaus Muth m...@hagos.de wrote:
Quick update.
On Sat, 08 Mar 2014 07:46:06 +0100
Klaus Muth m...@hagos.de wrote:
Quick update.
Since I was really interested in password security of OpenOffice, Vanessa had
not much trouble to talk me into giving it a try. So I compiled an MPI
version of john and started it on my i7-2600 4-core 3.4GHz on
Quick update.
Since I was really interested in password security of OpenOffice, Vanessa had
not much trouble to talk me into giving it a try. So I compiled an MPI
version of john and started it on my i7-2600 4-core 3.4GHz on 7 CPUs, John
chose to use the AVX extension (no fancy graphic card - so