use_john_the_ripper_to_crack_password_hashes

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revisionBoth sides next revision
use_john_the_ripper_to_crack_password_hashes [31.01.2021 03:05] Pascal Suteruse_john_the_ripper_to_crack_password_hashes [31.01.2021 03:18] – [compile with OpenCL support to run on NVIDIA (and other) GPU's (tested on CentOS)] Pascal Suter
Line 53: Line 53:
  
 the ''-dev=gpu -fork=8'' options are there to use all cards in parallel. this will fork 8 individual processes each working on their own range of passwords at a time and each on a different GPU. If you have multiple hosts with GPU you may use MPI for that.  the ''-dev=gpu -fork=8'' options are there to use all cards in parallel. this will fork 8 individual processes each working on their own range of passwords at a time and each on a different GPU. If you have multiple hosts with GPU you may use MPI for that. 
 +
 +===== Performance examples =====
 +if you press any key during the run, you will get a status showing you c/s (crypts per second). here are a few numbers from the systems i had access to at the moment of writing this article: 
 +^ CPU / GPU ^ c/s rate ^ method used ^
 +| 8-core i7-8809G CPU| 7'500 | OpenMP |
 +| 128-core (2 socket) AMD ROME 7742| 150'000 | OpenMP |
 +| 8 x GeForce RTX 2080 Ti | 8x190'000 | Fork | 
 +
  
  
  • use_john_the_ripper_to_crack_password_hashes.txt
  • Last modified: 02.02.2021 09:50
  • by Pascal Suter