[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 12 Mar 2012 20:50:32 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking RACF passwords
On Mon, Mar 12, 2012 at 09:50:56PM +0530, Dhiru Kholia wrote:
> Thanks to Nigel and Main Framed, RACF algorithm is now *known*. A JtR
> module has also been written (Check
> https://github.com/magnumripper/magnum-jumbo). The only part remaining
> is converting RACF binary database(s) into a format usable by JtR
> (i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt
> file from input RACF database), cracf2john.py (for CRACF.txt to JtR
> suitable conversion) and finally JtR to audit mainframe passwords.
Wow. Thank you!
$ GOMP_SPINCOUNT=2000000 ./john -te=1 -fo=racf
Benchmarking: RACF [32/64]... (8xOMP) DONE
Raw: 7357K c/s real, 968602 c/s virtual
The OpenMP performance is unstable, though. And you need to add the
proper sets of binary_hash and get_hash functions for scalability to
large numbers of hashes loaded for cracking at once. And this is
another candidate for conversion to usage of bitslice DES (instead of
OpenSSL's).
But overall this is very good news!
Alexander
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ