Chatsubo [(in)Security Dark] Labs

"... A consensual hallucination experienced daily by billions of legitimate operators, in every nation, by children being taught mathematical concepts... A graphic representation of data abstracted from banks of every computer in the human system. Unthinkable complexity. Lines of light ranged in the nonspace of the mind, clusters and constellations of data. Like city lights, receding into the distance... "
--
William Gibson.

domingo, 8 de agosto de 2010

John the Ripper benchmark

These are the results of a little benchmark that I performed a couple of months ago.

Versions that I compiled and tested:
- ANY
- SSE2
- MMX
- NTLM (source code patched to crack NTLM hashes)

BENCHMARKING
ANY
Benchmarking: Traditional DES [24/32 4K]... DONE
Many salts: 278297 c/s real, 347004 c/s virtual
Only one salt: 268979 c/s real, 334551 c/s virtual

Benchmarking: BSDI DES (x725) [24/32 4K]... DONE
Many salts: 9484 c/s real, 11738 c/s virtual
Only one salt: 9288 c/s real, 11552 c/s virtual

Benchmarking: FreeBSD MD5 [32/32]... DONE
Raw: 6795 c/s real, 8472 c/s virtual

Benchmarking: OpenBSD Blowfish (x32) [32/32]... DONE
Raw: 409 c/s real, 496 c/s virtual

Benchmarking: Kerberos AFS DES [24/32 4K]... DONE
Short: 266547 c/s real, 331526 c/s virtual
Long: 772505 c/s real, 960827 c/s virtual

Benchmarking: NT LM DES [32/32 BS]... DONE
Raw: 4773K c/s real, 5951K c/s virtual


MMX
Benchmarking: Traditional DES [64/64 BS MMX]... DONE
Many salts: 1041K c/s real, 1301K c/s virtual
Only one salt: 936512 c/s real, 1150K c/s virtual

Benchmarking: BSDI DES (x725) [64/64 BS MMX]... DONE
Many salts: 34188 c/s real, 42417 c/s virtual
Only one salt: 33753 c/s real, 41982 c/s virtual

Benchmarking: FreeBSD MD5 [32/32]... DONE
Raw: 6794 c/s real, 8425 c/s virtual

Benchmarking: OpenBSD Blowfish (x32) [32/32]... DONE
Raw: 417 c/s real, 520 c/s virtual

Benchmarking: Kerberos AFS DES [48/64 4K MMX]... DONE
Short: 339046 c/s real, 422751 c/s virtual
Long: 1031K c/s real, 1276K c/s virtual

Benchmarking: NT LM DES [64/64 BS MMX]... DONE
Raw: 8434K c/s real, 10516K c/s virtual


SSE2
Benchmarking: Traditional DES [128/128 BS SSE2]... DONE
Many salts: 2050K c/s real, 2543K c/s virtual
Only one salt: 1760K c/s real, 2194K c/s virtual

Benchmarking: BSDI DES (x725) [128/128 BS SSE2]... DONE
Many salts: 68352 c/s real, 85014 c/s virtual
Only one salt: 66560 c/s real, 82376 c/s virtual

Benchmarking: FreeBSD MD5 [32/32]... DONE
Raw: 6819 c/s real, 8465 c/s virtual

Benchmarking: OpenBSD Blowfish (x32) [32/32]... DONE
Raw: 417 c/s real, 520 c/s virtual

Benchmarking: Kerberos AFS DES [48/64 4K MMX]... DONE
Short: 339814 c/s real, 420562 c/s virtual
Long: 1025K c/s real, 1279K c/s virtual

Benchmarking: NT LM DES [128/128 BS SSE2]... DONE
Raw: 9648K c/s real, 11912K c/s virtual


NTLM Patch
Benchmarking: Traditional DES [24/32 4K]... DONE
Many salts: 280217 c/s real, 348529 c/s virtual
Only one salt: 269644 c/s real, 333718 c/s virtual

Benchmarking: BSDI DES (x725) [24/32 4K]... DONE
Many salts: 9659 c/s real, 12013 c/s virtual
Only one salt: 8982 c/s real, 10980 c/s virtual

Benchmarking: FreeBSD MD5 [32/32]... DONE
Raw: 6806 c/s real, 8402 c/s virtual

Benchmarking: OpenBSD Blowfish (x32) [32/32]... DONE
Raw: 417 c/s real, 520 c/s virtual

Benchmarking: Kerberos AFS DES [24/32 4K]... DONE
Short: 265574 c/s real, 331140 c/s virtual
Long: 741427 c/s real, 901979 c/s virtual

Benchmarking: NT LM DES [32/32 BS]... DONE
Raw: 4750K c/s real, 5836K c/s virtual

Benchmarking: NT MD4 [Generic 1x]... DONE
Raw: 9549K c/s real, 11906K c/s virtual



CRACKING
[nitr0us@nectar run]$ ./unshadow ~/passwd ~/shadow > ~/passshad

ANY
[nitr0us@nectar run]$ time ./john ~/passshad
Loaded 4 password hashes with 4 different salts (FreeBSD MD5 [32/32])
eilrahc (charlie)
newpass (ted)
Bond007 (jim)
virginia (monk)
guesses: 4 time: 0:00:00:01 100% (2) c/s: 5654 trying: virginia

real 0m1.016s
user 0m0.730s
sys 0m0.022s

MMX
[nitr0us@nectar run]$ time ./john ~/passshad
Loaded 4 password hashes with 4 different salts (FreeBSD MD5 [32/32])
eilrahc (charlie)
newpass (ted)
Bond007 (jim)
virginia (monk)
guesses: 4 time: 0:00:00:00 100% (2) c/s: 5768 trying: virginia

real 0m1.008s
user 0m0.695s
sys 0m0.025s



SSE2
[nitr0us@nectar run]$ time ./john ~/passshad
Loaded 4 password hashes with 4 different salts (FreeBSD MD5 [32/32])
eilrahc (charlie)
newpass (ted)
Bond007 (jim)
virginia (monk)
guesses: 4 time: 0:00:00:00 100% (2) c/s: 5827 trying: virginia

real 0m0.984s
user 0m0.734s
sys 0m0.016s


NTLM-Patch
ANY
[nitr0us@nectar run]$ time ./john ~/PWDUMP_OUT.txt
Loaded 7 password hashes with no different salts (NT LM DES [32/32 BS])
PASSWOR (susan:1)
JOSHUA (falken)
A (monk:2)
MASTER1 (george)
VIRGINI (monk:1)
8 (susan:2)
POOR (mike)
guesses: 7 time: 0:00:00:01 (3) c/s: 1560K trying: 4OUH - POOR

real 0m1.252s
user 0m0.843s
sys 0m0.043s


[nitr0us@nectar run]$ time ./john ~/PWDUMP_OUT.txt --format=nt
Loaded 5 password hashes with no different salts (NT MD4 [Generic 1x])
joshua (falken)
master1 (george)
virginia (monk)
passwor8 (susan)
poor (mike)
guesses: 5 time: 0:00:00:01 (3) c/s: 1309K trying: cbc7 - pamc

real 0m1.474s
user 0m0.952s
sys 0m0.040s


MMX
[nitr0us@nectar run]$ time ./john ~/PWDUMP_OUT.txt
Loaded 7 password hashes with no different salts (NT LM DES [64/64 BS MMX])
PASSWOR (susan:1)
JOSHUA (falken)
A (monk:2)
MASTER1 (george)
VIRGINI (monk:1)
8 (susan:2)
POOR (mike)
guesses: 7 time: 0:00:00:01 (3) c/s: 1727K trying: 4OUH - PAVS

real 0m1.127s
user 0m0.804s
sys 0m0.039s

[nitr0us@nectar run]$ time ./john ~/PWDUMP_OUT.txt --format=nt
Loaded 5 password hashes with no different salts (NT MD4 [Generic 1x])
joshua (falken)
master1 (george)
virginia (monk)
passwor8 (susan)
poor (mike)
guesses: 5 time: 0:00:00:01 (3) c/s: 1426K trying: cbc7 - pamc

real 0m1.348s
user 0m1.009s
sys 0m0.040s


SSE2
[nitr0us@nectar run]$ time ./john ~/PWDUMP_OUT.txt
Loaded 7 password hashes with no different salts (NT LM DES [128/128 BS SSE2])
PASSWOR (susan:1)
JOSHUA (falken)
A (monk:2)
MASTER1 (george)
VIRGINI (monk:1)
8 (susan:2)
POOR (mike)
guesses: 7 time: 0:00:00:01 (3) c/s: 1915K trying: 4OUH - PRN3

real 0m1.019s
user 0m0.732s
sys 0m0.030s

[nitr0us@nectar run]$ time ./john ~/PWDUMP_OUT.txt --format=nt
Loaded 5 password hashes with no different salts (NT MD4 [X86 SSE2 5x])
joshua (falken)
master1 (george)
virginia (monk)
passwor8 (susan)
poor (mike)
guesses: 5 time: 0:00:00:01 (3) c/s: 1459K trying: cbjk - pov0

real 0m1.315s
user 0m0.935s
sys 0m0.046s

Interesting results ;) ... HAPPY CRACKING !!

No hay comentarios:

Publicar un comentario en la entrada