Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
@ChrisJohnRiley JtR was already exploiting this "flaw" for almost a year now. Nothing new here ;) @SecPhil @1Password @hashcat @solardiz[hr]Additionally, JtR supports the latest "Cloud Keychain" forma... |
|
halfie |
Very old oclHashcat-plus Support
|
44 |
362,046 |
04-16-2013, 07:24 PM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
@atom: what is the maximum password length supported for this format? 15 as usual? |
|
halfie |
Very old oclHashcat-plus Support
|
44 |
362,046 |
04-17-2013, 06:37 AM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
@aestu: OpenSSL is not thread safe (especially its error handling part) unless some callbacks have been implemented.
See https://curl.haxx.se/libcurl/c/threaded-ssl.html. How much speed are you getti... |
|
halfie |
General Talk
|
17 |
140,970 |
06-29-2012, 08:34 AM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
I implemented support for cracking PKCS #12 files in JtR (based on aestu's program).
$ ../run/john -format=pfx -t
Benchmarking: pfx [32/32]... DONE
Raw: 2121 c/s real, 2121 c/s virtual
How does Elco... |
|
halfie |
General Talk
|
17 |
140,970 |
06-29-2012, 11:14 AM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
aestu: are you sure about the speeds you are getting? I am getting very low speeds (2K/s).
Can you take a look at https://github.com/magnumripper/magnum-jumbo/blob/bleeding-jumbo/src/pfx_fmt.c
an... |
|
halfie |
General Talk
|
17 |
140,970 |
06-29-2012, 11:29 AM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
Can you post the .pfx file for which you are getting high speeds? PM if fine with me. Thanks! |
|
halfie |
General Talk
|
17 |
140,970 |
06-29-2012, 02:26 PM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
Sample pfx which I am using: https://openwall.info/wiki/_media/john/PKCS-12.zip |
|
halfie |
General Talk
|
17 |
140,970 |
06-29-2012, 03:33 PM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
I checked the speed of Elcomsoft Distributed Password Recovery and it is 1831 for openwall.pfx file. My JtR
plug-in is faster than EDPR.
@aestu: do report back your speeds with openwall.pfx. I tried ... |
|
halfie |
General Talk
|
17 |
140,970 |
06-29-2012, 04:47 PM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
Yes, My JtR plug-in supports multicore too (using OpenMP) though I haven't tested it much. 6175 p/s on a 4-core machine sounds right for openwall.pfx file. I get double the speeds on a pfx file genera... |
|
halfie |
General Talk
|
17 |
140,970 |
06-30-2012, 03:35 PM |
|
|
Thread: Cracking a p12 PFX certificate
Post: RE: Cracking a p12 PFX certificate
$ ../run/john hash # Single-core results.
Loaded 1 password hash (pfx [32/64])
guesses: 0 time: 0:00:00:08 0.00% (3) c/s: 95412 trying: crxee
guesses: 0 time: 0:00:00:23 0.00% (3) c/s: 103019 t... |
|
halfie |
General Talk
|
17 |
140,970 |
07-01-2012, 09:38 AM |
|
|
Thread: IKE Preshared Key from Aggressive Mode VPNs
Post: RE: IKE Preshared Key from Aggressive Mode VPNs
People, please post some sample "hashes" / test vectors. It would be good to have algorithm explained with a code snippet. Thanks! |
|
halfie |
Feature Requests
|
16 |
53,233 |
06-24-2012, 03:41 PM |
|
|
Thread: IKE Preshared Key from Aggressive Mode VPNs
Post: RE: IKE Preshared Key from Aggressive Mode VPNs
This will be supported in JtR in a short while. Beta multi-core version benchmark:
$ ../run/john -format:ike -t
Benchmarking: IKE PSK HMAC-MD5 / HMAC-SHA1 [32/64]... (3xOMP) DONE
Raw: 1337K c/s real... |
|
halfie |
Feature Requests
|
16 |
53,233 |
07-07-2012, 11:26 AM |
|
|
Thread: PHD hashrunner 2013
Post: RE: PHD hashrunner 2013
KT819GM Wrote: (05-27-2013, 03:07 PM)
--
Did JTR team posted anywhere spec's of hardware they used in this contest? Also seems some next steps should be oclhashcat-* distribution system or something ... |
|
halfie |
Organisation and Events
|
16 |
39,369 |
05-28-2013, 09:19 AM |
|
|
Thread: How to extract a hash (VNC, SSH2 or SMB) from a WireShark capture file
Post: RE: How to extract a hash (VNC, SSH2 or SMB)
Which version of Ettercap are you using?
Parsing VNC packets is supported by Ettercap (I fixed the VNC dissector some time back but I might have missed something).
Can you share some .pcap fil... |
|
halfie |
General Help
|
13 |
69,937 |
03-20-2013, 07:01 PM |
|
|
Thread: How to extract a hash (VNC, SSH2 or SMB) from a WireShark capture file
Post: RE: How to extract a hash (VNC, SSH2 or SMB) from ...
I think your VNC session was using encryption (at least at some point). I can successfully extract the "hash" from your .pcap file and also crack it using JtR-jumbo.
Please use latest versions of JtR... |
|
halfie |
General Help
|
13 |
69,937 |
03-21-2013, 01:53 PM |
|
|
Thread: 1Password - AgileBits
Post: RE: 1Password - AgileBits
Latest JtR-jumbo supports "Cloud Keychain" files (I just added support for it and the speeds are simply awesome!).
Also, a bug in parsing of "Agile Keychain" format has been fixed.
And the pass... |
|
halfie |
Very old oclHashcat-plus Support
|
13 |
24,890 |
04-14-2013, 08:07 AM |
|
|
Thread: Cracking DES With HashCat
Post: RE: Cracking DES With HashCat
perlish Wrote: (05-15-2012, 04:04 AM)
--
atom Wrote: (03-18-2012, 07:23 PM)
--
I am not planning it. Try JtR. Its the king of DES @ CPU. Any reason why you want it in hashcat?
--
JTR can only run i... |
|
halfie |
Old hashcat Support
|
11 |
41,245 |
05-15-2012, 07:16 AM |
|
|
Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash
@radix: What speeds are you getting per core?
Here are JtR numbers (it uses OpenSSL for MS SQL 2012 format).
✗ ../run/john -fo:mssql12 -t
Benchmarking: MS SQL 2012 SHA512 [ms-sql12]... DONE
Ma... |
|
halfie |
Feature Requests
|
11 |
42,559 |
08-21-2012, 05:35 PM |
|
|
Thread: Algo : WoltLab BB3
Post: RE: Algo : WoltLab BB3
Xanadrel Wrote: (06-26-2010, 11:44 AM)
--
Just asking for WBB3 algo support,
It's sha1($salt.sha1($salt.sha1($pass)))
Some examples (hash:salt:pass) :
Code:
--
e2063f7c629d852302d302059937601... |
|
halfie |
Feature Requests
|
10 |
28,166 |
05-15-2012, 07:59 AM |
|
|
Thread: Algo : WoltLab BB3
Post: RE: Algo : WoltLab BB3
atom Wrote: (06-26-2010, 02:52 PM)
--
sorry, not possible. internal structures of both hashcat and oclHashcat can only work with a maximum password < 55 chars length.
--
@atom: and how is WoltLab ... |
|
halfie |
Feature Requests
|
10 |
28,166 |
05-16-2012, 07:00 AM |