Date: Sat, 17 Nov 2012 17:49:58 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Re: cracking passwords with a kerberos traffic dump / aes256-cts-hmac-sha1-96 (18) On Sat, Nov 17, 2012 at 4:45 PM, buawig <buawig@...il.com> wrote: >> I have implemented such a format (attached) with the help of code >> posted on insidepro.com forum and by asking "ghudson" numerous >> questions on #krbdev . However, it is super slow due to use of PBKDF2 >> with 4096 iterations. > > that was fast, thank you! > > I cloned bleeding-jumbo and copied krb-ng_fmt_plug.c into src, > modified the Makefile (HAVE_KRB5 = -DHAVE_KRB5) and tried to build it, > but failed (see attachment). Modifying Makefile is not necessary. Make sure you checkout "unstable-jumbo" branch (git checkout unstable-jumbo). The compilation errors are strange. Can you try the attached file (after deleting the old one)? ✗ ../run/john -fo:krb5ng -t Benchmarking: MS Kerberos 5 AS-REQ Pre-Auth aes256-cts-hmac-sha1-96 [32/64]... DONE Raw: 377 c/s real, 377 c/s virtual I got 3X speedup by using Lukas's PBKDF2 code. -- Cheers, Dhiru View attachment "krb-ng_fmt_plug.c" of type "text/x-csrc" (13925 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.