Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <355f800cf5fa2916a7b2e3dd4b81ac16@smtp.hushmail.com>
Date: Fri, 5 Apr 2013 20:34:10 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: netntlm bitsliced conversion

On 5 Apr, 2013, at 20:16 , deepika dutta <deepikadutta_19@...oo.com> wrote:
> Hi,
> 
> I have completed the netntlm bitsliced conversion. The benchmarks are as follows on my 64 bit ubuntu machine.

Cool, I'll have a look.

> The patch is attached for your testing. I will next look into the binary() function in the exploit formats as you mentioned.

Please checkout the bleeding-jumbo branch for this, and submit any patches against that branch. The unstable-jumbo branch is in a (mostly) bugfix-only state. Also, in the bleeding branch the exploit formats are put together in one file (ntlmv1_mschapv2_fmt_plug.c) with shared functions - and they do share binary().

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.