Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 6 Oct 2014 11:34:54 +0200 (CEST)
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
cc: spirosfr.1985@...il.com
Subject: Cracking VRRP and GLBP hashes

Hej!

Recently, I worked with Spiros Fraganastasis to add support for cracking VRRP
and GLBP hashes (some weird Cisco proprietary protocols).

$ ../run/glbp2john.py 10-0.0-1412077029.pcap > glbp-hashes

$ ../run/john glbp-hashes -w=wordlist.txt
Loaded 36 password hashes with 36 different salts (hsrp, ...
Press 'q' or Ctrl-C to abort, almost any other key for status
password12345    (56)
password12345    (54)

$ ../run/vrrp2john.py 20-0.0-1412012695.pcap > vrrp-hashes

$ ../run/john vrrp-hashes -w=wordlist.txt
Loaded 1 password hash (hsrp, "MD5 authentication" HSRP, ...
Press 'q' or Ctrl-C to abort, almost any other key for status
password12345    (768)

$ OMP_NUM_THREADS=2 ../run/john --test --format=hsrp
Will run 2 OpenMP threads
Benchmarking: hsrp, "MD5 authentication" HSRP, VRRP, GLBP [MD5 32/64]...
Many salts:	5197K c/s real, 2598K c/s virtual
Only one salt:	4866K c/s real, 2433K c/s virtual

Yes, at some point, we discovered that it is possible to use the existing
"hsrp" format to crack the newer hash types.

...

We have more proprietary hashes to reverse (and could always use more hands).

https://github.com/magnumripper/JohnTheRipper/issues

At some point, we will also be writing patches to enhance Loki to attack the
authenticated versions of the different Cisco protocols.

https://github.com/kholia/Loki (Git mirror of the original Loki project).

Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.