Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 9 Mar 2007 23:04:56 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: LM an NTLM combination

Alain,

On Fri, Mar 09, 2007 at 08:41:16PM +0100, Alain Espinosa wrote:
> Antares send me privately the password file with the hashs (passwd) and the
> wordlist (wordlist) but i cant reproduce the problem.

I am able to reproduce the problem with john-1.7.2-ntlm-alainesp-4, but
not with john-1.7.2-ntlm-alainesp-5 (no SSE2).  With -5, I get exactly
the same hashes cracked as with the old john-ntlm-v03.diff; with -4,
some hashes are not getting cracked.  I was testing on fewer hashes than
Antares had, though.  (I do not have his files.)

I suggest that you try to reproduce the problem with -4, to make sure
that you've really fixed the bug in -5 (inadvertently?) rather than
merely made it not manifest itself on these particular files for some
subtle reason.

> Testing this i find a bug not relate with this problem in the SSE2 code in "
> john-1.7.2-ntlm-alainesp-5.diff" that lost some passwords. I fix it and i
> send the fix to the list soon.

This suggests that you should be testing these patches on larger sets
of hashes.  Please use Antares' files from now on.  You may also
generate many NTLM hashes of both weak and strong passwords using this
Perl module -
http://search.cpan.org/~zefram/Authen-Passphrase/lib/Authen/Passphrase/NTHash.pm

Thanks,

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: 5B341F15  fp: B3FB 63F4 D7A3 BCCC 6F6E  FC55 A2FC 027C 5B34 1F15
http://www.openwall.com - bringing security into open computing environments

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ