![]() |
|
Date: Fri, 10 Oct 2014 17:59:09 +0200 (CEST) From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com cc: lex@...listicgroup.com Subject: Cracking VTP authentication hashes with JtR Hej! Recently, I worked with Alexey Lapitsky to add support for cracking VTP authentication hashes. $ ../run/vtp2john.py 20-0.0-1412864161.pcap > vtp-hashes $ ../run/john vtp-hashes -w=wordlist.txt Loaded 2 password hashes with 2 different salts (vtp, "MD5 based authentication" VTP [MD5 32/64]) Will run 8 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status 123 (93) 123 (93) https://github.com/magnumripper/JohnTheRipper has the latest bits, as usual. We currently support cracking VTP v1 and v2 hashes. We don't have access to real Cisco hardware switches to get VTP v3 authentication hashes. Let us know if you can help here. Dhiru PS: Yersinia probably never worked against authenticated VTP. Maybe, now it will ;)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.