[prev in list] [next in list] [prev in thread] [next in thread] 

List:       john-users
Subject:    Re: [john-users] JTR Vs PasswordPro
From:       "Alain Espinosa" <alainesp () gmail ! com>
Date:       2007-04-24 1:20:40
Message-ID: 4f445b980704231820y29bc8047u1ea78f21c64a0f9f () mail ! gmail ! com
[Download RAW message or body]


There are a table with some performance of know programs who crack
NTLM and MSCASH.
Tested in "Real Mode" (not benchmark) and with varius options
(different number of
hashes, different sets of characters in bruteforce). The numbers are
"average" of this
options but not big difference are noted.

(NTLM Test in Celeron D 2.66 GHz, EM64T capable, mode 32 bits):

 *Tools*

*Speed (hashes / seg.)  M = 1 000 000*

 MDCrack 1.82 (5)

13,7M*

 *My implementation*

*9,0M*

 Cain y Abel 4.8 (1)

6,5M

 SamInside 2.8.0.0 (3)

5,5M

 LC5 (2)

5,0M

 LCP 5.04 (4)

4,9M

 *MDCrack only soport brute force method and load only one hash making
it very unpractice.
Besides John "incremental" is a more smart that MDCrack bruteforce.




Numbers are with only one hash, but difference inter
programs remain the same with more hashes.
(MSCASH, Test in Celeron D 2.66 GHz, EM64T capable, mode 32 bits):

 *Tools*

*Speed (hashes / seg.)  M = 1 000 000*

 *My implementation*

*4,5M*

  PasswordsPro 2.3.1.0 (3)

1,7M

Cain y Abel 4.8 (1)

1,4M


  <http://www.openwall.com/john>

References

1)    http://www.oxid.it
2)    http://www.atstake.com/lc <http://en.wikipedia.org/wiki/Lm_hash>
3)   http://www.insidepro.com/
4)   http://www.lcpsoft.com/english/index.htm
5)   http://mdcrack.openwall.net
 <http://www.securiteam.com/tools/5JP0I2KFPA.html>


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic