|
Message-ID: <9c6c54405bab3f4a6af8d6f35bfacced@smtp.hushmail.com> Date: Fri, 15 Feb 2013 14:23:28 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: netntlm bitsliced conversion On 15 Feb, 2013, at 12:35 , deepika dutta <deepikadutta_19@...oo.com> wrote: > > It is also an excellent example for future DES stuff. We should do the same to NETNTLM_old_fmt_plug.c for a starter - it is almost identical to MSCHAPv2. . > > I know it should be easier now to convert other formats too. I will look into this format and if it is almost similar to mschap, then probably it will get finished quickly. Note that this too has a default format (netntlm, NETNTLM_fmt_plug.c) that exploits a weakness and does not need fast DES at all. The fallback format is where you'd use BS DES, it's netntlm-naive in NETNTLM_old_fmt_plug.c. OTOH you could have a look at binary() in the "exploit" formats. That's where we brute-force the 2^16 possible block 3 DES keys from the NT hash. Maybe that could be done with BS? It would speed up loading a lot, but not actual cracking. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.