Follow us on Twitter or via RSS feeds with tweets or complete announcement texts or excerpts
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 02 Oct 2012 23:34:19 +0200
From: buawig <buawig@...il.com>
To: john-users@...ts.openwall.com
CC: buawig@...il.com
Subject: Re: issue with cracking SIP dumps

Hi guys,

since Dhiru Kholia was unfortunately not able to reproduce this it would
be great if a few people could run the attached crackme file against
john-1.7.9-jumbo-7 (or jumbo-6) and tell me whether it run fine or not.
I can reproduce it on two separate hosts every time I run john against
this file.


sipdump2john.py sipdump.out.anonymized.txt > crackme


sha1sum sipdump.out.anonymized.txt  crackme
17ceabe11c748d553b0f76e3b66bda54d0a3a5f1  sipdump.out.anonymized.txt
9c6069a36f74c7facaf4797f53914f44a702924e  crackme

john  crackme
john: sip_fmt_plug.c:103: get_salt: Assertion `num_lines == 13' failed.
Aborted (core dumped)


(using 1.7.9-jumbo-7 [linux-x86-64-native])

thank you!

1.1.1.1-2.2.2.2:$sip$*1.1.1.1*2.2.2.2*Fake*xz.fake.com*REGISTER*sip*2.2.2.2*5060*1111111111-1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa*1aAAAAAAAAAAAAA*11111111*auth*MD5*1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux - Powered by OpenVZ