(06-29-2012, 08:34 AM)halfie Wrote: @aestu: OpenSSL is not thread safe (especially its error handling part) unless some callbacks have been implemented.
See http://curl.haxx.se/libcurl/c/threaded-ssl.html. How much speed are you getting with your cracker?
crackpkcs12 use openssl into two steps:
1.- Every thread loads its own pkcs#12 struct from file
2.- Check passwords
Step 1: I avoid concurrency by using a mutex.
Step 2: Every thread has its own struct and there is no concurrency problems
You can check crackpkcs12 works.
Regarding speed, I achieve 260k/s using brute force and this CPU (not a cutting edge one):
Intel(R) Core(TM)2 Quad CPU Q8300 @ 2.50GHz
aestu
(06-29-2012, 11:14 AM)halfie Wrote: I implemented support for cracking PKCS #12 files in JtR (based on aestu's program).
$ ../run/john -format=pfx -t
Benchmarking: pfx [32/32]... DONE
Raw: 2121 c/s real, 2121 c/s virtual
How does Elcomsoft distributed password recovery (which cracks at speed 500k/s) achieve those nice speeds?
Could I see your code? Is there a public repository?
Thanks,
aestu