Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sun, 2 Dec 2012 21:43:40 +0000
From: shane Shane <shane@...twareontheside.info>
To: john-dev@...ts.openwall.com
Subject: Re: Document Decryption:Fourth Year Project

Cool I'll have a look at the npdf2john might do a complete re-write in
python since I
don't know much perl. I'll also have a look at the OpenCL code for
OpenOffice docs but
no promises on that because it won't help my project in anyway since OpenCL
can't be
used on the raspberry pi.

Regards,

Shane

On Sun, Dec 2, 2012 at 3:24 AM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:

> On Sun, Dec 2, 2012 at 4:27 AM, magnum <john.magnum@...hmail.com> wrote:
> > On 1 Dec, 2012, at 20:28 , shane Shane <shane@...twareontheside.info>
> wrote:
> > I'm doing a fourth year project about cracking encrypted documents,
> > MSOffice, OpenOffice and PDF files on a distributed network of raspberry
> pi
> > micro computers. I'm using john as the cracking software on each of the
> > slave nodes in the network. If there is anything that needs to be done to
> > help speed up the cracking of these documents types or otherwise improve
> > john's ability to crack documents please let me know. I'd love help out.
> >
> >
> > Among shit we need done we do have an npdf2john that seriously needs
> work.
> > Apart from that, be sure to tell us any real shortcomings. I'm not really
> > updated on openoffice - what do we need to do to support cracking it it
> real
> > fast?
>
> Yes, npdf2john currently sucks. I am sure that ndpf2john can be done
> under 300 lines of code (if one is able to figure out the logic of the
> current Perl code).
>
> Code for cracking OpenOffice documents (which use Blowfish encryption)
> using GPU is already present.
>
> However, new OpenCL code needs to be written for cracking OpenOffice
> documents which use AES encryption. The current PBKDF2 OpenCL code
> doesn't handle input hashed passwords of length 32 bytes (generated by
> SHA256).
>
> --
> Cheers,
> Dhiru
>

[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ