|
Message-ID: <CANO7a6w6M1C6dqvJgMzwvCBbxusOeTTZjaW5rzXVL84ojxFtpQ@mail.gmail.com>
Date: Mon, 20 Aug 2012 22:33:27 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: [PATCH] Cracking MS SQL 2012 hashes
On Mon, Aug 20, 2012 at 10:04 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Mon, Aug 20, 2012 at 7:39 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> On Mon, Aug 20, 2012 at 12:32 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>>> ✗ ../run/john -fo:mssql12 -t
>>> Benchmarking: MS SQL 2012 SHA512 [ms-sql12]... DONE
>>> Raw: 1889K c/s real, 1889K c/s virtual
>>
>> I have added OMP support.
>>
>> ✗ ../run/john -fo:mssql12 -t
>> Benchmarking: MS SQL 2012 SHA512 [ms-sql12]... (3xOMP) DONE
>> Raw: 4817K c/s real, 1621K c/s virtual
>>
>>> I don't know much about the existing MS-SQL 05 format (which I have
>>> based my code on). Can someone familiar with the code take a look?
>
> Are set_key operations done in a bunch before crypt_all is called? I
> am thinking yes.
> So, the key_length should now become an array (like saved_key) for OMP
> support to work correctly.
key_length is now an array. v3 patch attached. Now, the patch
correctly cracks real hashes.
--
Cheers,
Dhiru
Download attachment "0001-Add-support-for-cracking-MS-SQL-2012-hashes-v3.patch" of type "application/octet-stream" (10989 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.