I am not new to Linux, or Debian but I have been working within Kali just to learn how to crack a password from an old HD of mine that I have forgotten the Password of to recover a few lost files. John the ripper finds 2 but leaves me hanging forever searching and finding the 3td as it says. I am running a pretty standard machine here with a A-10 chip and an additional Plugin small
msi R7 240 Graphics card.
Below is the listing of the CPU chip mounted on my MB.
Code:
david-ub@davidub:~$ lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Byte Order: Little Endian
Address sizes: 48 bits physical, 48 bits virtual
CPU(s): 4
On-line CPU(s) list: 0-3
Thread(s) per core: 2
Core(s) per socket: 2
Socket(s): 1
NUMA node(s): 1
Vendor ID: AuthenticAMD
CPU family: 21
Model: 56
Model name: AMD A10-7860K Radeon R7, 12 Compute Cores 4C+8G
Stepping: 1
Frequency boost: enabled
CPU MHz: 1934.491
CPU max MHz: 3600.0000
CPU min MHz: 1400.0000
BogoMIPS: 7186.72
Virtualization: AMD-V
L1d cache: 32 KiB
L1i cache: 192 KiB
L2 cache: 4 MiB
NUMA node0 CPU(s): 0-3
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled v
ia prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user
pointer sanitization
Vulnerability Spectre v2: Mitigation; Full AMD retpoline, STIBP disabled,
RSB filling
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtr
r pge mca cmov pat pse36 clflush mmx fxsr sse s
se2 ht syscall nx mmxext fxsr_opt pdpe1gb rdtsc
p lm constant_tsc rep_good nopl nonstop_tsc cpu
id extd_apicid aperfmperf pni pclmulqdq monitor
ssse3 fma cx16 sse4_1 sse4_2 popcnt aes xsave
avx f16c lahf_lm cmp_legacy svm extapic cr8_leg
acy abm sse4a misalignsse 3dnowprefetch osvw ib
s xop skinit wdt lwp fma4 tce nodeid_msr tbm to
poext perfctr_core perfctr_nb bpext ptsc cpb hw
_pstate ssbd vmmcall fsgsbase bmi1 xsaveopt ara
t npt lbrv svm_lock nrip_save tsc_scale vmcb_cl
ean flushbyasid decodeassists pausefilter pfthr
eshold overflow_recov
I might not have enough graphics power to break my password faster. I have played with John many times to let you know so I do know most commands. I read alot about how important cuda cores are on pentesting. What is the average needed to do things in a timely manner?
Thank You