Date: Tue, 14 Jan 2014 16:03:45 -0500 From: Rich Rumble <richrumble@...il.com> To: john-users@...ts.openwall.com Subject: Re: Cracking MSChap v2 On Tue, Jan 14, 2014 at 3:37 PM, magnum <john.magnum@...hmail.com> wrote: > It would be easy to output the last two octets (of 16), but that would be > pointless. Brute forcing the full NT hash *instead* of guessing passwords > would mean up to 2^56 rounds of DES, perhaps roughly 2^55 on average. I > think that would take a day or so on an eight core. If the password is > uncrackable it might be meaningful but it's out of scope for JtR. Right, and a Tool's branch sounds neat, but might get stagnate. We do have all those "something_2john" scripts, which may qualify as tools, so who knows.And again I agree it's not typical of JtR to do, but perhaps it sparks someone to take more interest in JtR development. -rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.