|
Message-ID: <CABob6irfduhEXWbVQsqR9efHTC-Tn3PhRp7m0RfmVRMm69Qn1w@mail.gmail.com> Date: Sat, 9 Nov 2013 03:15:06 +0100 From: Lukas Odzioba <lukas.odzioba@...il.com> To: john-dev@...ts.openwall.com Subject: Re: gpg requires more test vectors 2013/11/9 Lukas Odzioba <lukas.odzioba@...il.com>: > I have a problem with generating keys in batch mode, somehow such > generated key is not crackable so I am doing something wrong or we > have some bug. The problem was that for most of my testing I was using MD5 hash which seems to be only one broken. > Since gpg2john supports gecos field and password is embedded in > comment john should crack all loaded hashes. > I have no problems with keys generated by "gpg --gen-key" interactive > mode, but it would be crazy to do that manually. I made invalid assumption above, single mode didn't handle that. $ cat ALL | sed 's/.*(pass is //' | cut -f1 -d')' > wlist $ cat wlist | head -n 1 MD5-3DES-openwall $ ./john ALL -w:wlist Loaded 25 password hashes with 25 different salts (gpg, OpenPGP / GnuPG Secret Key [32/32]) Press 'q' or Ctrl-C to abort, almost any other key for status RIPEMD160-AES192-openwall (RIPEMD160-AES192.sec) RIPEMD160-AES256-openwall (RIPEMD160-AES256.sec) RIPEMD160-AES-openwall (RIPEMD160-AES.sec) RIPEMD160-BLOWFISH-openwall (RIPEMD160-BLOWFISH.sec) RIPEMD160-CAST5-openwall (RIPEMD160-CAST5.sec) SHA1-AES192-openwall (SHA1-AES192.sec) SHA1-AES256-openwall (SHA1-AES256.sec) SHA1-AES-openwall (SHA1-AES.sec) SHA1-BLOWFISH-openwall (SHA1-BLOWFISH.sec) SHA1-CAST5-openwall (SHA1-CAST5.sec) SHA256-AES192-openwall (SHA256-AES192.sec) SHA256-AES256-openwall (SHA256-AES256.sec) SHA256-AES-openwall (SHA256-AES.sec) SHA256-BLOWFISH-openwall (SHA256-BLOWFISH.sec) SHA256-CAST5-openwall (SHA256-CAST5.sec) SHA512-AES192-openwall (SHA512-AES192.sec) SHA512-AES256-openwall (SHA512-AES256.sec) SHA512-AES-openwall (SHA512-AES.sec) SHA512-BLOWFISH-openwall (SHA512-BLOWFISH.sec) SHA512-CAST5-openwall (SHA512-CAST5.sec) 20g 0:00:00:02 DONE (2013-11-09 02:09) 8.064g/s 28.22p/s 440.3c/s 440.3C/s SHA512-TWOFISH-openwall Use the "--show" option to display all of the cracked passwords reliably Session completed $ ./john -show=left ALL MD5-CAST5.sec:$gpg$*17*42*1024*002170c3c5778fdbeedd788a1eda3827ef7d6d73491c022d5b76d33ff70ccae8d243aab7e2f40afcb4a4*3*254*1*3*8*019e084555546803*65536*49afdb670acda6c6 MD5-BLOWFISH.sec:$gpg$*17*42*1024*78974e8edc833372d5280c72af3699deadf6902e5f6f318c509f4e3a74ab5508c001b174028c5762b85b*3*254*1*4*8*05e135ef911c76ad*65536*a07c0f2a9ff58867 MD5-AES.sec:$gpg$*17*42*1024*9ab2b332bac3025b1f70621b48aeb49e1af1435041afb3dba9176c7257f72a9db9a8bfb9efa1fd326ddb*3*254*1*7*16*7c3cedfeb3bceace051706ad45b4809b*65536*cd91cfa373e9538b MD5-AES256.sec:$gpg$*17*42*1024*0f99df2244628f19ddb6a103edef89fba4f3c347e78ef857dabdea0d6270946bf9a5af49f64d88dd7d84*3*254*1*9*16*1f78a0098bb4398f90fd7047a4fed4f5*65536*98e5173305268c69 MD5-AES192.sec:$gpg$*17*42*1024*c5758fe02511b9066971e7300528d9913877ebdb8a9f8f9cec7354eea7208320e03c2de13640abf2817f*3*254*1*8*16*72deaef23475b122d865a8f0c7903dda*65536*2579bf43cba09570 Lukas
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.