Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 17 Nov 2012 17:52:49 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: cracking passwords with a kerberos traffic dump /
 aes256-cts-hmac-sha1-96 (18)

On Sat, Nov 17, 2012 at 3:46 PM, magnum <john.magnum@...hmail.com> wrote:
> On 17 Nov, 2012, at 7:41 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> On Sat, Nov 17, 2012 at 4:43 AM, buawig <buawig@...il.com> wrote:
>>> Thank you for your help and numerous answers, looking forward to see
>>> krb5-18-traffic_fmt.c ;)
>>
>> I have implemented such a format (attached) with the help of code
>> posted on insidepro.com forum and by asking "ghudson" numerous
>> questions on #krbdev . However, it is super slow due to use of PBKDF2
>> with 4096 iterations.
>> Lot of optimizations can be done (get rid of nfold operations, use
>> Lukas's PBKDF2 code, magnum's valid timestamp heuristics etc). I will
>> port this format to OpenCL soon.
>
> Cool. Be sure to use the PBKDF2 from current wpapsk-opencl as it uses a split kernel.

magnum,

I am thinking of working on the pcap parser and MiTM downgrade attack
first. I think leaving the OpenCL port to an expert (you!) is best.

-- 
Cheers,
Dhiru

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.