Back to Top
|score||name||Last Update Received||Eligible|
|36017||Insidepro Team||2010-08-01 00:03:16||No|
|6530||Bill E Ghote||2010-08-01 00:06:31||No|
|5891||Benny Lava||2010-07-31 22:14:04||Yes|
|2629||Rippin and Tearin||2010-07-31 23:23:13||Yes|
|5||Analog Conspiracy||2010-07-30 11:13:18||No|
"Eligible" means that a team has completed the Code: validation to prove that they have someone physically attending DEFCON and are eligible to win the prize. See the How to Register page for more info. Ping a human if you think you've submitted a Code: but didn't get credit.
Total Cracked Per Hash Type
Click on the "Left Uncracked" value to see the list of uncracked hashes for that algorithm.
|NT MD4 (NTLM)
|NS LDAP (SHA)
|Salted SHA (SSHA)
|Blowfish Crypt (bcrypt)
Team Cracks Over Time
We intended that the passwords be roughly asymptotic in difficulty--so that
many would crack fairly quickly at first, but they would get harder and harder
(and thus crack slower) the more progress a team made. This seems to have
pretty much worked as designed.
Here is a graph of all teams' crack performance over the life of the contest.
Note that many teams did not start right away, some as much as halfway through the competition.
(Yes, we ran out of good contrasting colors.)
Each team's cracks over time are graphed below. Where we have a writeup from
that team, their graph is a link to it.