Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 12 Dec 2011 03:14:16 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: cracking RADIUS shared secrets with john the ripper

2011-12-09 19:52, jfoug wrote:
> It has been posted as patch 0043-  the salt() function now does all of the
> work, including figuring out what salts are identical.  Dynamic returns 4
> byte or 8 byte 'salts' back to john, which will always be unique.  These 4
> or 8 bytes are simply the data contents of a pointer.

After applying 0043 I got a segfault in thin PHPS. Turned out the thin
formats' salt_size was passed unmodified to john which ended up as
pointers allocated as 4 bytes (in PHPS case) instead of pointer size. A
fix is posted as 0045.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ