begood Posted June 10, 2009 Report Posted June 10, 2009 And hereby I also present my open source, SSE2 optimized, NTLM password brute forcer, called EnTibr. This is almost the same code as the one used in EmDebr. I also used reversing of the MD4 algorithm, skipping the full 3rd round. With my own system I get around 150 Mhashes/s using 4 cores @ 3.2Ghz.Again, I hope this helps others to understand reversing and maybe you can use my code to write a better/faster open source cracker. Feel free to leave a comment or to post some improvements!http://blog.distracted.nl/2009/05/faster-brute-forcers.html Quote
begood Posted August 6, 2009 Author Report Posted August 6, 2009 Over 50% speed increase on the new EnTibrLet's keep it short, new plaintext generation, caching:Old speed: ~200 Mhashes/sNew speed: ~315 Mhashes/sJust shows the algorithm should not always be the main target of optimization.Distracted: Over 50% speed increase on the new EnTibr Quote
cmiN Posted August 23, 2009 Report Posted August 23, 2009 O fi c++, dar totusi nu-mi dau seama deloc nici din sursa cum poate fi atat de rapid ... Quote
begood Posted August 23, 2009 Author Report Posted August 23, 2009 reversing + optimizari pe cpu + sse2inversarea unui hash criptograficSc00bz, neinbrucke, barsmonster au lucrat la algoritmi Quote