Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO7a6zf3P=Ox-aeZWUELan8s2J3_fKdxD5ghya3h-oyQhzsLA@mail.gmail.com>
Date: Sun, 2 Jun 2013 22:19:54 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: RACF debug tool (vs. racf2john.c)

On Fri, May 31, 2013 at 11:56 PM, Corbert Malmgreen
<germany_jethro@...lcan.com> wrote:
> There's a RACF debug tool floating around in the Swedish Police circles
> as part of an ongoing investigation, supposedly recovered from seized
> computer(s).
>
> The tool seems a bit more sophisticated than racf2john.c's bruteforce
> way of extracting password hashes. Aside from printing more data in the
> RACF database, it also shows previous password hashes (SETROPTS PASSWORD
> HISTORY) stored in user segments. Alas, it's a bit buggy.
>
> I'm attaching a slightly anonymized version run through indent and other
> tools in case anybody wants to improve racf2john.c with support for
> HISTORY. Original author(s) and license unknown.

Thanks for sharing this Corbert!

I will see how I can integrate this into JtR-jumbo.

-- 
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.