Azure GPU Instances in duty of recover RAR passwords

Using Azure GPU instances to recover/crack RAR passwords, 3 steps:

  1. Deploy this Standard Azure Gaming Instance with Nvidia Tesla GPU: https://github.com/MariuszFerdyn/azure-gaming
  2. Download cRARk55 http://www.crark.net. There is only one file encrypted so you can extract rest.
  3. Rename any def to password.def and configure tool – usually just line 56 [$a $A $1 $!] *
  4. Execute cRARk.exe newbase.rar and wait for results.

cRARk.exe rar.rar
cRARk 5.5b (OpenCL enabled) Freeware
Copyright 1995-2001, 2006-20 by P. Semjanov, http://www.crark.net
(c) Password Definition Language & PDL engine v. 4.0 by P. Semjanov 1999-2019

Testing archive rar.rar: version 5.0
Testing newbase\fx-server\.gitignore
OpenCL device #0 Tesla M60 found, 1177 MHz, 2048 SP cores, GPU rate = 11.26
Trying to compile FAST NVIDIA OpenCL kernel. Please wait… Successfully.
Running self-test… Successfully

Choosing best crypto functions……….
Chosen: AVX2, AVX, AVX2 (-f479), AES-NI
Clock cycles per password expected = 8458338 (SIMD)/31320216 (x64) (*), theoretical = 40235893
SHA-256 clock cycles per byte expected = 2.1 (SIMD)/7.5 (x64) (*), theoretical = 9.6
Intel(R) Xeon(R) CPU E5-2690 v3 @ 2.60GHz found, CPU rate = 4.76 (*)
(*) May be inaccurate if Turbo Boost is on

Processing line 59 of password definition file…
Expected passwords to test (approx.) = 7417954634
Testing 1-character passwords …
Passwords tested = 94 (time = 00.32, rate = 292 p/s)
Testing 2-character passwords …
Testing * on device #0, Block size is: 512 x 256 (-m512), step = 1/2 (-d2)
Passwords tested = 8930 (time = 01.51, rate = 5898 p/s)
Testing 3-character passwords …
Testing * on device #0, Block size is: 512 x 256 (-m512), step = 1/2 (-d2)
Passwords tested = 839514 (time = 51.79, rate = 16209 p/s)
Testing 4-character passwords …

Be aware that it is almost impossible to crack more than 8 characters password.