This has been solved.
First attempted was a full 8-character upper/lower/numeric brute force
which took over 6 days and failed.
Second attempt was lower-case with control characters, and succeeded in
around 40 minutes.
There's a control character in it ;)
Because of the outpouring of negativity about these disclosures, I am
reluctant to post the actual password without the user's consent, since
he's still alive. If anyone knows Bill, and can contact him, please ask
for permission.
This was done on three nodes of a Dell HPC cluster, each node containing
two Tesla V100 nVidia GPU cards, for a total of 30720 CUDA cores.
Session..........: hashcat
Status...........: Running
Hash.Type........: descrypt, DES (Unix), Traditional DES
Hash.Target......: .2xvLVqGHJm8M
Time.Started.....: Fri Oct 18 06:53:25 2019 (40 mins, 1 sec)
Time.Estimated...: Fri Oct 18 08:06:55 2019 (33 mins, 29 secs)
Guess.Mask.......: ?1?1?1?1?1?1?1?1 [8]
Guess.Charset....: -1 lowernonprint.hcchr, -2 Undefined, -3 Undefined,
-4 Undefined
Guess.Queue......: 1/1 (100.00%)
Speed.#2.........: 1666.0 MH/s (401.65ms) @ Accel:32 Loops:1024 Thr:256
Vec:1
Speed.#3.........: 1663.7 MH/s (402.23ms) @ Accel:32 Loops:1024 Thr:256
Vec:1
Speed.#*.........: 3329.7 MH/s
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.........: 22674229475111/29366087151182 (77.21%)
Rejected.........: 0/22674229475111 (0.00%)
Restore.Point....: 108847949/714924299 (15.23%)
Restore.Sub.#2...: Salt:0 Amplifier:147456-148480 Iteration:0-1024
Restore.Sub.#3...: Salt:0 Amplifier:134144-135168 Iteration:0-1024
Candidates.#2....: $HEX[6e7010627170696d] -> $HEX[076710740f150509]
Candidates.#3....: $HEX[0a1f676c0f150509] -> $HEX[1f710c1979060809]
Hardware.Mon.#2..: Temp: 61c Util:100% Core:1380MHz Mem: 877MHz Bus:16
Hardware.Mon.#3..: Temp: 57c Util:100% Core:1380MHz Mem: 877MHz Bus:16
On 10/10/2019 8:07 AM, Leah Neukirchen wrote:
Arthur Krewat <krewat(a)kilonet.net> writes:
Oh well. Late to the party as usual ;) (time is
EST, New York)
-rw------- 1 ******** *** 23 Oct 9 06:09 cracked.node006.txt
$ cat cracked.node006.txt
ZghOT0eRm4U9s:p/q2-q4!
I was notified Bill Joy's password does not yet appear
in any list:
bill:.2xvLVqGHJm8M:8:10:& Joy,4156424948:/usr/bill:/bin/csh