|
Date: Mon, 12 Dec 2011 03:14:16 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: cracking RADIUS shared secrets with john the ripper 2011-12-09 19:52, jfoug wrote: > It has been posted as patch 0043- the salt() function now does all of the > work, including figuring out what salts are identical. Dynamic returns 4 > byte or 8 byte 'salts' back to john, which will always be unique. These 4 > or 8 bytes are simply the data contents of a pointer. After applying 0043 I got a segfault in thin PHPS. Turned out the thin formats' salt_size was passed unmodified to john which ended up as pointers allocated as 4 bytes (in PHPS case) instead of pointer size. A fix is posted as 0045. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.