06-29-2012, 11:14 AM
I implemented support for cracking PKCS #12 files in JtR (based on aestu's program).
$ ../run/john -format=pfx -t
Benchmarking: pfx [32/32]... DONE
Raw: 2121 c/s real, 2121 c/s virtual
How does Elcomsoft distributed password recovery (which cracks at speed 500k/s) achieve those nice speeds?
$ ../run/john -format=pfx -t
Benchmarking: pfx [32/32]... DONE
Raw: 2121 c/s real, 2121 c/s virtual
How does Elcomsoft distributed password recovery (which cracks at speed 500k/s) achieve those nice speeds?