Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 17 Nov 2012 17:49:58 +0530
From: Dhiru Kholia <>
Subject: Re: cracking passwords with a kerberos traffic dump /
 aes256-cts-hmac-sha1-96 (18)

On Sat, Nov 17, 2012 at 4:45 PM, buawig <> wrote:
>> I have implemented such a format (attached) with the help of code
>> posted on forum and by asking "ghudson" numerous
>> questions on #krbdev . However, it is super slow due to use of PBKDF2
>> with 4096 iterations.
> that was fast, thank you!
> I cloned bleeding-jumbo and copied krb-ng_fmt_plug.c into src,
> modified the Makefile (HAVE_KRB5 = -DHAVE_KRB5) and tried to build it,
> but failed (see attachment).

Modifying Makefile is not necessary. Make sure you checkout
"unstable-jumbo" branch (git checkout unstable-jumbo).

The compilation errors are strange. Can you try the attached file
(after deleting the old one)?

✗ ../run/john -fo:krb5ng -t
Benchmarking: MS Kerberos 5 AS-REQ Pre-Auth aes256-cts-hmac-sha1-96
[32/64]... DONE
Raw:	377 c/s real, 377 c/s virtual

I got 3X speedup by using Lukas's PBKDF2 code.


View attachment "krb-ng_fmt_plug.c" of type "text/x-csrc" (13925 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.