|
Message-ID: <CANO7a6ygaS=axeNEt_4H0zZ_Zo2LCuP95waDYr2R2+GoQkzFQg@mail.gmail.com> Date: Mon, 29 Oct 2012 20:44:15 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Cc: Milen Rangelov <gat3way@...3way.eu> Subject: new fastssh format, please test and review Hi, By using the attached fastssh format, it is possible to get > 3X speedup over existing code (speedup is currently only for AES-128-CBC encrypted keys which are default these days on many systems). ✗ ../run/john ~/crackme # AMD X3 720 Loaded 1 password hash (fast SSH RSA / DSA [32/64]) guesses: 0 time: 0:00:02:55 0.00% (3) c/s: 1450K trying: bbschksi - bbscipid $ ../run/john ~/crackme # AMD FX-8120 Loaded 1 password hash (fast SSH RSA [32/64]) guesses: 0 time: 0:00:02:32 0.00% (3) c/s: 2386K trying: mmow-al - mm04ang For some reason, benchmarking speed is very low. Actual cracking speed is nice :-) You can increase "#define SAFETY_FACTOR 32" parameter to reduce false positives at the cost of speed. This factor controls the number of bytes we decrypt. This format has no multi-threading issues which might still lurk in the existing ssh format. However, this formats uses lot of hacks (which might be incorrect!). Please test and review thoroughly. Milen, It would be great if you could validate the various hacks used in this program. You are the right guy as you are working on something similar for hashkill. -- Cheers, Dhiru View attachment "fastssh_fmt_plug.c" of type "text/x-csrc" (19863 bytes) Download attachment "fastssh2john.py" of type "application/octet-stream" (26994 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.