Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 27 Jun 2014 10:04:55 -0400
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Junos Pulse VPN Client (Saved Passwords)

On Fri, Jun 27, 2014 at 7:32 AM, Richard B. Tilley <brad@....us> wrote:
> [HKEY_CURRENT_USER\Software\Juniper Networks\Junos Pulse\User Data\ive:2eed21ed-ab06-4244-a8f6-12fa59b838a1\Password1]
>
> This is a REG_BINARY type. I can edit it (remove or change a byte) and the VPN connection will fail, place it back and it works again. They seem to be encrypted somehow. So I was curious if anyone on the list may have figured this format out and used John to crack them?
I wonder if it's anything like the Cisco VPN passwords were:
https://www.unix-ag.uni-kl.de/~massar/bin/cisco-decode (perhaps they
still are, I haven't checked in a longtme)
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.