Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 11 Dec 2011 14:43:37 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: cracking RADIUS shared secrets with john the ripper

2011-12-10 00:23, Didier Arenzana wrote:
> On Fri, Dec 9, 2011 at 7:52 PM, jfoug <jfoug@....net> wrote:
>> It has been posted as patch 0043-  the salt() function now does all of the
>> work, including figuring out what salts are identical.  Dynamic returns 4
>> byte or 8 byte 'salts' back to john, which will always be unique.  These 4
>> or 8 bytes are simply the data contents of a pointer.
> 
> I have donwloaded and built the patch, and you will find attached a
> patch on top of this one, that contains the following modifications:
...

I just posted a patch 0044 containing radius2john.pl and the dynamic
config (versions currently on
http://openwall.info/wiki/john/Using-john-to-crack-RADIUS-shared-secrets).
I did not add the above mentioned modifications to dynamic_fmt, I'll
leave that to Jim. This johnswap.h vs OSX thing was unexpected, good
thing it was caught now.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ