Date: Sat, 17 Nov 2012 12:15:08 +0100 From: buawig <buawig@...il.com> To: john-users@...ts.openwall.com Subject: Re: cracking passwords with a kerberos traffic dump / aes256-cts-hmac-sha1-96 (18) > I have implemented such a format (attached) with the help of code > posted on insidepro.com forum and by asking "ghudson" numerous > questions on #krbdev . However, it is super slow due to use of PBKDF2 > with 4096 iterations. that was fast, thank you! I cloned bleeding-jumbo and copied krb-ng_fmt_plug.c into src, modified the Makefile (HAVE_KRB5 = -DHAVE_KRB5) and tried to build it, but failed (see attachment). sha1sum krb-ng_fmt_plug.c c8348b6c35825dfa52c7ad9ebadb7ea618ba46fd krb-ng_fmt_plug.c View attachment "krb-ng_fmt_plug_compile-error.txt" of type "text/plain" (6265 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.