|
Message-ID: <3a07fda18d0e37806c762556ddb23feb@smtp.hushmail.com> Date: Tue, 14 Jan 2014 19:37:46 +0100 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: Cracking MSChap v2 On 2014-01-14 15:15, Rob Fuller wrote: > @magnum those are amazing speeds, are you saying that JtR jumbo already > does NetNTLMv1 => NTLM via DES hack/bypass/brute (not sure what the right > word is) The latest released Jumbo doesn't, but it's about as fresh as Pong by Atari. The unstable & bleeding git branches do since a year back. The optimized version brute forces the last third of the MD4 (NT hash) once and for all when loading the ciphertext, a DES key space of just 2^16. The inner loop just do an MD4 from the candidate and if the last third doesn't match the bruted one, it's rejected without wasting more time on it. For any number of salts, we still only need that single MD4 and that's why the many salts speed is so good. This compared to the "naive" version that does one MD4 for each candidate plus at least one DES for each salt iirc. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.