From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, RCVD_IN_DNSWL_NONE autolearn=ham autolearn_force=no version=3.4.2 Received: from minnie.tuhs.org (minnie.tuhs.org [45.79.103.53]) by inbox.vuxu.org (OpenSMTPD) with ESMTP id e8bdef4e for ; Tue, 8 Oct 2019 20:57:27 +0000 (UTC) Received: by minnie.tuhs.org (Postfix, from userid 112) id 3B7A39BC26; Wed, 9 Oct 2019 06:57:26 +1000 (AEST) Received: from minnie.tuhs.org (localhost [127.0.0.1]) by minnie.tuhs.org (Postfix) with ESMTP id 50FB99BBD7; Wed, 9 Oct 2019 06:57:15 +1000 (AEST) Authentication-Results: minnie.tuhs.org; dkim=pass (1024-bit key; unprotected) header.d=kilonet.net header.i=@kilonet.net header.b="L3+ZhQaT"; dkim-atps=neutral Received: by minnie.tuhs.org (Postfix, from userid 112) id CAA299B9B4; Wed, 9 Oct 2019 06:57:13 +1000 (AEST) Received: from p3plsmtpa06-01.prod.phx3.secureserver.net (p3plsmtpa06-01.prod.phx3.secureserver.net [173.201.192.102]) by minnie.tuhs.org (Postfix) with ESMTPS id 6F1999B9AF for ; Wed, 9 Oct 2019 06:57:12 +1000 (AEST) Received: from medusa.kilonet.net ([72.69.223.115]) by :SMTPAUTH: with ESMTPA id HwXfilr6H2h2cHwXfiQPAV; Tue, 08 Oct 2019 13:57:11 -0700 Received: from [199.89.231.101] (ender.kilonet.net [199.89.231.101]) by medusa.kilonet.net (8.14.8/8.15.1) with ESMTP id x98KvA3x009824 for ; Tue, 8 Oct 2019 16:57:10 -0400 (EDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kilonet.net; s=default; t=1570568230; bh=teL+eTK0ky0GOid/DPBtq075wP+bJML77KsjlXZRbZU=; h=Subject:To:References:From:Date:In-Reply-To; b=L3+ZhQaTpKv0URYGVFRiBqMoa4cgFPXzYH7+xW6E504SSyLplR4oCl8A6rZ01vdl9 uSCmsKNdWS+63ePL0sdeIjLIjiA9QQexkwWNvsy5KUN3cLXc/sXJaxH3zqwnRseCCe XyWcWDodSkeaNXb7Kz2c4wSWOu22mH6Vl/8KewSc= To: tuhs@minnie.tuhs.org References: <6dceffe228804a76de1e12f18d1fc0dc@inventati.org> <87bluxpqy0.fsf@vuxu.org> <20191005180503.GA31679@tom-desk.erg.abdn.ac.uk> From: Arthur Krewat Message-ID: Date: Tue, 8 Oct 2019 16:57:06 -0400 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Content-Language: en-US X-CMAE-Envelope: MS4wfHIYiJ92d6ImiNLzeww3dOnLcIleb97fHPiFdJDDnxR4KToYfjrqAsofEciVXVEMonoG+5og5pdDFRugRuwKlq/oUYpMvV5a/T3WV9Yvk0Sf8ixPjF1q Pic9JdRcH45wCfgg+/4+O1CPjiI53IdG3EOflJyRkr72zmowTykrStMulSosoNOrD4qF4AHYPj9Dig== Subject: Re: [TUHS] Recovered /etc/passwd files X-BeenThere: tuhs@minnie.tuhs.org X-Mailman-Version: 2.1.26 Precedence: list List-Id: The Unix Heritage Society mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: tuhs-bounces@minnie.tuhs.org Sender: "TUHS" Using hashcat on an nvidia GPU cluster. crypt() is slow on it, I guess because the GPUs are not able to do it efficiently. On 10/8/2019 4:40 PM, Dave Horsfall wrote: > On Tue, 8 Oct 2019, Arthur Krewat wrote: > >> I have some more out of this list, but not sure if I should send them or >> not. Ken's has not been cracked - yet. > > Has anyone tried "John the Ripper"?  And there was another tool (name > forgotten) that was specifically designed to attack crypt(). > > -- Dave >