[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 18 Jan 2007 07:57:39 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: New NT patch
On Wed, Jan 17, 2007 at 09:23:14PM -0500, Erik Winkler wrote:
> Patch compiles on a PowerPC MacOSX, but I get the following on the
> bench test:
>
> Benchmarking: NT MD4 [Rapid NT MD4]... FAILED (get_hash[0])
This was to be expected - the code assumes a little-endian architecture.
> and I get "No password hashes loaded" when I try to test it against a
> password file.
This is also not news - I've already mentioned in here that this patch
lacks the loader.c hack needed for PWDUMP format files. For it to work,
you have to use passwd-like files:
user:$NT$8846f7eaee8fb117ad06bdd830b7586c
(this was also supported with the old patches).
But it won't work anyway, until the get_hash_*() and binary_hash_*()
functions are fixed (this is trivial to do - just add the proper "and"
masks for 4, 8, and 12 bits).
--
Alexander Peslyak <solar at openwall.com>
GPG key ID: 5B341F15 fp: B3FB 63F4 D7A3 BCCC 6F6E FC55 A2FC 027C 5B34 1F15
http://www.openwall.com - bringing security into open computing environments
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ