Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 5 Jun 2018 18:47:10 +0200
From: Solar Designer <>
Subject: Re: Brute force Easy-RSA CA key with JTR?

On Tue, Jun 05, 2018 at 04:49:56PM +0100, Alexandre Badalo wrote:
> Can JTR brute force Easy-RSA generated CA private passphrase? I forgot
> the PassPhrase for my CA but i *think* i remember some pattern that
> might be on the passphrase, which should reduce a lot the brute force time

I don't have a reliable answer, but FWIW the support for cracking some
SSH key formats that we have in JtR -jumbo is known to also work for
OpenSSL private keys in general.  I suspect it might work for their CA
private keys as well.  I didn't know what Easy-RSA was, but upon a quick
look at it appears to be a wrapper
around OpenSSL, so it is possible that our SSH key cracking support will
just work for you as well.

So please try in the run/ directory against your CA private
key.  If it produces reasonably looking output, then try running john
itself against that.  Do all of this using latest revisions of our code
from the bleeding-jumbo branch on GitHub.  Let us know of your results.

Perhaps we need to improve the naming and/or documentation for and the corresponding JtR format to account for such uses.

> This is my first mail to a mailing list, i hope that this is the way to
> use it, if not, sorry :D

Your use so far looks good to me.



Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.