Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Feb 2013 14:23:28 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: netntlm bitsliced conversion

On 15 Feb, 2013, at 12:35 , deepika dutta <deepikadutta_19@...oo.com> wrote:

> > It is also an excellent example for future DES stuff. We should do the same to NETNTLM_old_fmt_plug.c for a starter - it is almost identical to MSCHAPv2. .
> 
> I know it should be easier now to convert other formats too. I will look into this format and if it is almost similar to mschap, then probably it will get finished quickly. 


Note that this too has a default format (netntlm, NETNTLM_fmt_plug.c) that exploits a weakness and does not need fast DES at all. The fallback format is where you'd use BS DES, it's netntlm-naive in NETNTLM_old_fmt_plug.c.

OTOH you could have a look at binary() in the "exploit" formats. That's where we brute-force the 2^16 possible block 3 DES keys from the NT hash. Maybe that could be done with BS? It would speed up loading a lot, but not actual cracking.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ