Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 6 Oct 2014 16:50:40 +0200 (CEST)
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Cracking NTP authentication hashes

Hi,

Latest JtR-jumbo now supports cracking NTP MD5 authentication hashes.

https://github.com/magnumripper/JohnTheRipper

$ ../run/ntp2john.py NTP_with_MD5_key_foobar.pcap > ntp-hash

Sample .pcap can be downloaded from the http://wiki.wireshark.org/NTP page.

$ ../run/john ntp-hash -w=wordlist.txt
Loaded 1 password hash (dynamic_1016 [md5($s.$p) (long salt) 128/128 AVX 480x4x3])
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
foobar           (1)

$ OMP_NUM_THREADS=2 ../run/john --test --format=dynamic_1016
Will run 2 OpenMP threads
Benchmarking: dynamic_1016 [md5($s.$p) (long salt) 128/128 AVX 480x4x3]... (2xOMP)
Many salts:	27463K c/s real, 13800K c/s virtual
Only one salt:	20834K c/s real, 10417K c/s virtual

Thanks Jim for the dynamic format :-)

Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.