Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 17 Nov 2012 12:15:08 +0100
From: buawig <buawig@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: cracking passwords with a kerberos traffic dump
 / aes256-cts-hmac-sha1-96 (18)

> I have implemented such a format (attached) with the help of code
> posted on insidepro.com forum and by asking "ghudson" numerous
> questions on #krbdev . However, it is super slow due to use of PBKDF2
> with 4096 iterations.

that was fast, thank you!

I cloned bleeding-jumbo and copied krb-ng_fmt_plug.c into src,
modified the Makefile (HAVE_KRB5 = -DHAVE_KRB5) and tried to build it,
but failed (see attachment).

sha1sum  krb-ng_fmt_plug.c
c8348b6c35825dfa52c7ad9ebadb7ea618ba46fd  krb-ng_fmt_plug.c


View attachment "krb-ng_fmt_plug_compile-error.txt" of type "text/plain" (6265 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.