[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 15 Mar 2012 13:39:18 -0400
From: John Hoyt <HOYTJ@...mson.edu>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Re: Re: Cracking RACF passwords
Great! Thanks for your hard work.
John
On 3/15/12 1:22 PM, "Dhiru Kholia" <dhiru.kholia@...il.com> wrote:
>On Mon, Mar 12, 2012 at 9:50 PM, Dhiru Kholia <dhiru.kholia@...il.com>
>wrote:
>> (https://github.com/magnumripper/magnum-jumbo). The only part remaining
>> is converting RACF binary database(s) into a format usable by JtR
>> (i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt
>> file from input RACF database), cracf2john.py (for CRACF.txt to JtR
>> suitable conversion) and finally JtR to audit mainframe passwords.
>
>I have just committed racf2john.c utility for converting RACF binary
>databases into JtR friendly format. Now JtR can be used for auditing
>RACF passwords end-to-end.
>
>Huge thanks to Nigel Pentland (author of CRACF) for providing sample code.
>
>--
>Cheers,
>Dhiru
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ