Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 12 Mar 2012 21:50:56 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Re: Cracking RACF passwords

On Mon, Mar 12, 2012 at 8:15 PM, Andres Ederra <andres.ederra@...il.com> wrote:
> Hi Alexander (and all),
>
> Anyway as far as I have investigated the issue the problem is to learn
> the RACF algorithm, coding it as a john module its a no-issue.
>
> I'm afraid that the people who know that info maybe retired (or
> dead...) and IBM is not going to collaborate that much (I would want
> to be wrong but...)

Thanks to Nigel and Main Framed, RACF algorithm is now *known*. A JtR
module has also been written (Check
https://github.com/magnumripper/magnum-jumbo). The only part remaining
is converting RACF binary database(s) into a format usable by JtR
(i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt
file from input RACF database), cracf2john.py (for CRACF.txt to JtR
suitable conversion) and finally JtR to audit mainframe passwords.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.