kleines Beispiel : :floet:
This demonstration run on a PC with one P4 2.8GHz processor and 1GB memory.
=============================================================================================================
F:\rainbowcrack-1.2-win>ver
Microsoft Windows XP [Version 5.1.2600]
F:\rainbowcrack-1.2-win>dir f:\rt5 /p
Volume in drive F is New Volume
Volume Serial Number is 9871-FDF2
Directory of f:\rt5
07/16/2004 03:46 PM <DIR> .
07/16/2004 03:46 PM <DIR> ..
07/12/2004 06:06 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_0.rt
07/12/2004 06:13 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_1.rt
07/12/2004 06:20 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_2.rt
07/12/2004 06:29 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_3.rt
07/12/2004 06:35 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_1_5400x67108864_0.rt
07/12/2004 06:41 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_1_5400x67108864_1.rt
07/12/2004 06:47 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_1_5400x67108864_2.rt
07/12/2004 06:53 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_1_5400x67108864_3.rt
07/12/2004 06:59 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_2_5400x67108864_0.rt
07/12/2004 07:04 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_2_5400x67108864_1.rt
07/12/2004 07:10 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_2_5400x67108864_2.rt
07/12/2004 07:16 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_2_5400x67108864_3.rt
07/12/2004 07:23 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_3_5400x67108864_0.rt
07/12/2004 07:30 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_3_5400x67108864_1.rt
07/12/2004 07:36 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_3_5400x67108864_2.rt
07/12/2004 07:42 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_3_5400x67108864_3.rt
07/12/2004 07:48 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_4_5400x67108864_0.rt
Press any key to continue . . .
07/12/2004 07:54 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_4_5400x67108864_1.rt
07/13/2004 02:25 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_4_5400x67108864_2.rt
07/12/2004 08:06 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_4_5400x67108864_3.rt
07/12/2004 08:12 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_5_5400x67108864_0.rt
07/12/2004 08:18 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_5_5400x67108864_1.rt
07/12/2004 08:24 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_5_5400x67108864_2.rt
07/12/2004 08:30 PM 1,073,741,824 lm_alpha-numeric-symbol14-space#1-7_5_5400x67108864_3.rt
24 File(s) 25,769,803,776 bytes
2 Dir(s) 20,748,546,048 bytes free
F:\rainbowcrack-1.2-win>net user administrator "N73k_a7()TUBoK"
The command completed successfully.
F:\rainbowcrack-1.2-win>net user guest "PrFa$=ptRcb^__"
The command completed successfully.
F:\rainbowcrack-1.2-win>net user user1 "z %G)r*EW&2nk#"
The command completed successfully.
F:\rainbowcrack-1.2-win>net user user2 "cjST$=W0U*-5CH"
The command completed successfully.
F:\rainbowcrack-1.2-win>net user user3 "(zw= ijV$i*vEX"
The command completed successfully.
F:\rainbowcrack-1.2-win>pwdump2 > pwfile
F:\rainbowcrack-1.2-win>type pwfile
Administrator:500:68c6bfbe81f763a1a1845dd2ecb8e08e:af4506812408e3184545b71455d726e7:::
Guest:501:290b64188492455875d04c7ab7847d24:4f30c22a73c9d97fcb49380fd50ebe7d:::
user1:1005:da1b88984baccc69136df64cc4df89dc:d1cd3d810b436e4877beb916a88d8a65:::
user2:1006:a8beaf83bdfd47fc53d8db28cdfcc2f4:d24196efeb4449ff2c01879da812f372:::
user3:1007:a6232b819b93ff9672e01f430d7f7ced:0ead8bada400b6ddcaebe6bbc5b1dfcc:::
F:\rainbowcrack-1.2-win>rcrack f:\rt5\*.rt -f pwfile
lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_0.rt:
854409216 bytes read, disk access time: 21.56 s
verifying the file...
searching for 10 hashes...
plaintext of a1845dd2ecb8e08e is ()TUBOK
plaintext of 136df64cc4df89dc is EW&2NK#
plaintext of a8beaf83bdfd47fc is CJST$=W
cryptanalysis time: 135.59 s
219332608 bytes read, disk access time: 6.11 s
searching for 7 hashes...
plaintext of 75d04c7ab7847d24 is TRCB^__
cryptanalysis time: 2.92 s
lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_1.rt:
854409216 bytes read, disk access time: 23.61 s
verifying the file...
searching for 6 hashes...
cryptanalysis time: 9.27 s
219332608 bytes read, disk access time: 6.78 s
searching for 6 hashes...
cryptanalysis time: 2.67 s
lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_2.rt:
854409216 bytes read, disk access time: 25.30 s
verifying the file...
searching for 6 hashes...
plaintext of 72e01f430d7f7ced is V$I*VEX
cryptanalysis time: 9.27 s
219332608 bytes read, disk access time: 5.78 s
searching for 5 hashes...
plaintext of 68c6bfbe81f763a1 is N73K_A7
plaintext of a6232b819b93ff96 is (ZW= IJ
cryptanalysis time: 1.91 s
lm_alpha-numeric-symbol14-space#1-7_0_5400x67108864_3.rt:
854409216 bytes read, disk access time: 23.77 s
verifying the file...
searching for 3 hashes...
plaintext of 290b641884924558 is PRFA$=P
cryptanalysis time: 3.47 s
219332608 bytes read, disk access time: 12.45 s
searching for 2 hashes...
cryptanalysis time: 0.98 s
lm_alpha-numeric-symbol14-space#1-7_1_5400x67108864_0.rt:
854409216 bytes read, disk access time: 22.70 s
verifying the file...
searching for 2 hashes...
plaintext of da1b88984baccc69 is Z %G)R*
plaintext of 53d8db28cdfcc2f4 is 0U*-5CH
cryptanalysis time: 11.74 s
statistics
-------------------------------------------------------
plaintext found: 10 of 10 (100.00%)
total disk access time: 148.06 s
total cryptanalysis time: 177.81 s
total chain walk step: 138386743
total false alarm: 24107
total chain walk step due to false alarm: 46458226
result
-------------------------------------------------------
Administrator N73k_a7()TUBoK hex:4e37336b5f613728295455426f4b
Guest PrFa$=ptRcb^__ hex:50724661243d70745263625e5f5f
user1 z %G)r*EW&2nk# hex:7a20254729722a455726326e6b23
user2 cjST$=W0U*-5CH hex:636a5354243d5730552a2d354348
user3 (zw= ijV$i*vEX hex:287a773d20696a5624692a764558
... und das ganze hat nichtmal verfluchte 3 Minuten gebraucht ... :sauf: