Facebook Twitter

John the Ripper 1.7.9-jumbo-6 , adds GPU support in New Release. John the Ripper 1.7.9-jumbo-6 Released earlier today. This is a" Community-enhanced " version, which includes many contributions from JtRcommunity members. "John the Ripper is a fast password cracker, currently available for many flavors of Unix, Windows, DOS, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix systems, supported out of the box are Windows LM hashes, plus lots of other hashes and ciphers in the community-enhanced version. " The biggest newthing is integrated GPU support, both CUDA and OpenCL - although for a subset of the hash and non-hash types only, not for all that aresupported on CPU. Its speeds on Core i7-2600K 3.4 GHz (actually 3.5 GHz due to Turbo Boost) are: 1 thread: Benchmarking: Traditional DES [128/128 BS AVX-16]... Features Added Added optional parallelization of the MD5-based crypt(3) code with OpenMP.

Issue 151 - security-onion - NetworkMiner (requires Mono) - Security Onion is a Linux distro for IDS (Intrusion Detection) and NSM (Network Security Monitoring). Security Onion 20111020 now available! Password cracking, mining, and GPUs. People imagine that sophisticated hacking requires sophisticated computers.

Password cracking, mining, and GPUs

The truth is that almost everything a hacker does can be done with a cheap notebook computer, or even a mobile phone. The major exception is password cracking, and related crypto tasks like bitcoin mining and certificate forgery. In these cases, a minor investment in hardware can be warranted. In particular, those who need to crack passwords (pen-testers, sysadmins, hackers) should buy a gaming graphics card in order to speed up cracking. Or, when buying notebooks for pen-testing, they should choose those with graphics processors. What’s a GPU Computers, as we know them, used to contain a single processor, called the central processing unit or CPU". Now they contain a second processor, called the graphics processing unit or GPU. But GPUs aren’t just for graphics; they are good for any highly repetitive task. It’s important to keep in mind that graphics processors are no more powerful than central processors.

Probably the Best Free Security List in the World. Google.


Network. Hacking. Bookmarks_Menu 1. Networking. Privacy. Python. Search. Snortsam. OpenX. Bookmarks_Menu 2. Bookmarks_Menu 3. Projects. For the last few years, while low-interaction (LI) honeypot systems like Nepenthes and PHoneyC are getting more and more powerful, the progress of high-interaction (HI) honeypot technology has been somewhat slower.


This is especially true for Sebek, the de-facto HI honeypot monitoring tool. Qebek is a QEMU based HI honeypot monitoring tool which aims at improving the invisibility of monitoring the attackers’ activities in HI honeypots. Qebek was developed by Chengyu Song during GSoc 2010. Our KYT paper on Qebek provides great detail on how to install and use Qebek. Its available at To obtain Qebek, check out its repository: svn co.