Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Jun 2015 10:12:02 +0800
From: Kai Zhao <loverszhao@...il.com>
To: john-dev@...ts.openwall.com
Subject: Kai's weekly report #9

Hello,

Accomplishments:

1. Implement --fuzz option, the builtin fuzzer which is similar to fuzz.pl.

The latest branch of --fuzz is here:

https://github.com/loverszhaokai/JohnTheRipper/tree/fuzz_option

And --fuzz found two bugs.

https://github.com/magnumripper/JohnTheRipper/issues/1472
https://github.com/magnumripper/JohnTheRipper/issues/1476

2. Fuzz AFS, agilekeychain, aix-ssha1, asa-md5, bcrypt, bfegg, dummy,
LM, scrypt and tripcode formats by afl, and didn't find bugs.

Priorities:

1. Debug --fuzz option.

http://www.openwall.com/lists/john-dev/2015/06/28/7

2. Implement --test-full option.

The idea is described here:

http://www.openwall.com/lists/john-dev/2015/06/22/1

3. Test and discuss the coding style for john core.
4. Figure out which C standard we want, document it, convert to it.


Best regards,

Kai

[ CONTENT OF TYPE text/html SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ