|
Message-ID: <CANO7a6y0jAgPY0E4r7YcWN1gOqn-qWdJ4cOiyD-pJCL=v69SZQ@mail.gmail.com>
Date: Sun, 28 Oct 2012 19:28:07 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: ssh_fmt / privkey without using high level OpenSSL functions
On Sun, Oct 28, 2012 at 5:44 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Sun, Oct 28, 2012 at 4:03 PM, Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> I tried to re-implement ssh / privkey format without using high level
>> OpenSSL functions. However I didn't get a speed-up over JtR's existing
>> ssh format :-(. Code is attached. Feel free to re-use it.
>
> Update: after some hacks, it seems that it is possible to get 4.5X
> speedup over existing code. Attaching latest code.
>
> However, I am getting some false positives (during actual cracking).
Attached fixed version.
✗ ../run/john crackme # on triple core 2.8 GHz CPU
Loaded 1 password hash (fast SSH RSA [32/64])
guesses: 0 time: 0:00:01:39 0.00% (3) c/s: 1573K trying: MoDY9 - MoDsp
guesses: 0 time: 0:00:01:56 0.00% (3) c/s: 1574K trying: kowneS - kowB7e
guesses: 0 time: 0:00:01:57 0.00% (3) c/s: 1573K trying: n6E2 - ntCx
For some reason, benchmarking speed is very low. Actual cracking speed
is nice :-)
You can tweak "#define SAFETY_FACTOR 32" to reduce false positives at
the cost of speed.
--
Cheers,
Dhiru
View attachment "fastssh_fmt_plug.c" of type "text/x-csrc" (18865 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.