Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 10 Oct 2014 17:59:09 +0200 (CEST)
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
cc: lex@...listicgroup.com
Subject: Cracking VTP authentication hashes with JtR

Hej!

Recently, I worked with Alexey Lapitsky to add support for cracking VTP
authentication hashes.

$ ../run/vtp2john.py 20-0.0-1412864161.pcap > vtp-hashes

$ ../run/john vtp-hashes -w=wordlist.txt
Loaded 2 password hashes with 2 different salts (vtp, "MD5 based authentication" VTP [MD5 32/64])
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
123              (93)
123              (93)

https://github.com/magnumripper/JohnTheRipper has the latest bits, as usual.

We currently support cracking VTP v1 and v2 hashes. We don't have access
to real Cisco hardware switches to get VTP v3 authentication hashes. Let
us know if you can help here.

Dhiru

PS: Yersinia probably never worked against authenticated VTP. Maybe, now
it will ;)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.