begood Posted June 10, 2009 Report Share Posted June 10, 2009 And hereby I also present my open source, SSE2 optimized, NTLM password brute forcer, called EnTibr. This is almost the same code as the one used in EmDebr. I also used reversing of the MD4 algorithm, skipping the full 3rd round. With my own system I get around 150 Mhashes/s using 4 cores @ 3.2Ghz.Again, I hope this helps others to understand reversing and maybe you can use my code to write a better/faster open source cracker. Feel free to leave a comment or to post some improvements!http://blog.distracted.nl/2009/05/faster-brute-forcers.html Quote Link to comment Share on other sites More sharing options...
begood Posted August 6, 2009 Author Report Share Posted August 6, 2009 Over 50% speed increase on the new EnTibrLet's keep it short, new plaintext generation, caching:Old speed: ~200 Mhashes/sNew speed: ~315 Mhashes/sJust shows the algorithm should not always be the main target of optimization.Distracted: Over 50% speed increase on the new EnTibr Quote Link to comment Share on other sites More sharing options...
cmiN Posted August 23, 2009 Report Share Posted August 23, 2009 O fi c++, dar totusi nu-mi dau seama deloc nici din sursa cum poate fi atat de rapid ... Quote Link to comment Share on other sites More sharing options...
begood Posted August 23, 2009 Author Report Share Posted August 23, 2009 reversing + optimizari pe cpu + sse2inversarea unui hash criptograficSc00bz, neinbrucke, barsmonster au lucrat la algoritmi Quote Link to comment Share on other sites More sharing options...