Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Oct 2012 20:44:15 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Cc: Milen Rangelov <gat3way@...3way.eu>
Subject: new fastssh format, please test and review

Hi,

By using the attached fastssh format, it is possible to get > 3X
speedup over existing code (speedup is currently only for AES-128-CBC
encrypted keys which are default these days on many systems).

✗ ../run/john ~/crackme # AMD X3 720
Loaded 1 password hash (fast SSH RSA / DSA [32/64])
guesses: 0  time: 0:00:02:55 0.00% (3)  c/s: 1450K  trying: bbschksi - bbscipid

$ ../run/john ~/crackme # AMD FX-8120
Loaded 1 password hash (fast SSH RSA [32/64])
guesses: 0  time: 0:00:02:32 0.00% (3)  c/s: 2386K  trying: mmow-al - mm04ang

For some reason, benchmarking speed is very low. Actual cracking speed
is nice :-)

You can increase "#define SAFETY_FACTOR    32" parameter to reduce
false positives at the cost of speed. This factor controls the number
of bytes we decrypt.

This format has no multi-threading issues which might still lurk in
the existing ssh format. However, this formats uses lot of hacks
(which might be incorrect!). Please test and review thoroughly.

Milen,

It would be great if you could validate the various hacks used in this
program. You are the right guy as you are working on something similar
for hashkill.

-- 
Cheers,
Dhiru

View attachment "fastssh_fmt_plug.c" of type "text/x-csrc" (19863 bytes)

Download attachment "fastssh2john.py" of type "application/octet-stream" (26994 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.