6/2/2023 0 Comments Use john the ripper windows 10![]() Results for salted hashes (where said multiplication was applied) are marked with asterisks (*). For salted hashes (DCC, DCC2, SSHA, MD5CRYPT, BCRYPT, SHA256CRYPT, SHA512CRYPT, WPA-PSK), this is the number of candidate passwords tested per second multiplied by the number of hashes (all of which use different salts in these benchmarks). ![]() ![]() For non-salted hashes (LM, NTLM, MD5, SHA1, SHA256, SHA512), this is the same as candidate passwords tested per second. Performance is reported in hashes computed per second. The programs are sorted by average performance in first 4 columns. Hash Suite 3.5 database file with 1 million NTLM hashes and 1 million LM hashes: 80MBĪll hashes were randomly generated.
0 Comments
Leave a Reply. |