Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 20 Aug 2012 22:33:27 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: [PATCH] Cracking MS SQL 2012 hashes

On Mon, Aug 20, 2012 at 10:04 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Mon, Aug 20, 2012 at 7:39 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> On Mon, Aug 20, 2012 at 12:32 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>>>  ✗ ../run/john -fo:mssql12 -t
>>> Benchmarking: MS SQL 2012 SHA512 [ms-sql12]... DONE
>>> Raw:    1889K c/s real, 1889K c/s virtual
>>
>> I have added OMP support.
>>
>> ✗ ../run/john -fo:mssql12 -t
>> Benchmarking: MS SQL 2012 SHA512 [ms-sql12]... (3xOMP) DONE
>> Raw:    4817K c/s real, 1621K c/s virtual
>>
>>> I don't know much about the existing MS-SQL 05 format (which I have
>>> based my code on). Can someone familiar with the code take a look?
>
> Are set_key operations done in a bunch before crypt_all is called? I
> am thinking yes.
> So, the key_length should now become an array (like saved_key) for OMP
> support to work correctly.

key_length is now an array. v3 patch attached. Now, the patch
correctly cracks real hashes.

-- 
Cheers,
Dhiru

Download attachment "0001-Add-support-for-cracking-MS-SQL-2012-hashes-v3.patch" of type "application/octet-stream" (10989 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.