Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <8CD8ABE29355B3E-11D0-9CAE@webmail-m029.sysops.aol.com>
Date: Tue, 25 Jan 2011 10:46:27 -0500
From: rs904c@...scape.net
To: john-users@...ts.openwall.com
Subject: Re: Password file hash type analysis in JtR


John Users/Frank/Alex,
I was thinking of this as being a pre-analysis type tool, not post cracking.  So, before any cracking begins, I would want to know which hash formats I have in the file.  This way I will make sure and manually run JtR on each of the other hash formats, if any, and not only on the first hash format JtR finds in the file.
I think the JtR executable with a command-line parameter (like: --analysis ) could do this more efficiently and cleanly, than a “For Loop”.  JtR is already doing this for the first hash format it finds, then it starts cracking.  I'd like to see it review all the hash formats, and just report which ones are contained in the file (with optional line numbers) and any it does not recognize.
Does this seem useful to you all, or just me?
-Robert B. Harris from VA

 

-----Original Message-----
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-users@...ts.openwall.com
Sent: Tue, Jan 25, 2011 4:56 am
Subject: Re: [john-users] Password file hash type analysis in JtR



Robert Harris wrote:
 I know that Unix/Linux and Windows password files can have multiple hash
 types in them, I think the following output/utility would be useful in
tR.
What is your use case?

>>> A Unix system file with multiple hash types used and supported.  This could also have been used for
the contest held this summer.


 Potential new output:

 The following password hash format(s) was/were discovered in the input
ile
 <file>:

 <format1>

 <format2>

 ...

 <formatx>
Is that just one line describing the format?
s you would specify it on the command line (with --format=) or as john
ould report it (DES vs. Traditional DES, BF vs. OpenBSD Blowfish, ...)?

>>> Both would be nice.

> Line(s) 1-30 contained <format1> type passwords

 Line(s) 31-60 contained <format2> type passwords

 ...                                              

 Line(s) 61-90 contained <formatx> type passwords
Without listing the corresponding hashes/passwords?
>>> Yes, I really wouldn't need the hash information, the line numbers would probably due fine.

Depending on your needs, something like this might work:
sample pot file:
$LM$44efce164ab921ca:123456
0xCP/g3c1sQc:password
0ewVEw7R2GAw:password
0vrzSg43HfWI:123456
0xCP/g3c1sQc:password
0.6.TrD/0sas:trustno1
rEJ1uz6ul/WU:trustno1
1$12$1YZMQPfPxS3.kStGKUBCO.:1111
10adc3949ba59abbe56e057f20f883e:123456
LM$b757bf5c0d87772f:1234
cut -d: -f 1 -s john.pot|grep -n "^" > cracked_hashes
cracked_hashes would then look like this:
1:$LM$44efce164ab921ca
:10xCP/g3c1sQc
:20ewVEw7R2GAw
:10vrzSg43HfWI
:10xCP/g3c1sQc
:10.6.TrD/0sas
:trEJ1uz6ul/WU
:$1$12$1YZMQPfPxS3.kStGKUBCO.
:e10adc3949ba59abbe56e057f20f883e
0:$LM$b757bf5c0d87772f

ename your john.pot file before continuing.
Actually, the jumbo-patched john has an option --pot=NAME,
ut I never used it... That's why I just renamed john.pot)
The next step probably requires the jumbo patch, due to --show=LEFT.
And, for our use case, it requires an empty pot file.)
for f in DES BSDI MD5 BF AFS LM; do ./john --format=$f --show=LEFT
racked_hashes > cracked_hashes_$f; done
You may also write it across multiple lines, the shell will prompt you
or the continuation:
for f in DES BSDI MD5 BF AFS LM
 do
 ./john --format=$f --show=LEFT cracked_hashes > cracked_hashes_$f
 done
Check how the hashes are distributed according to hash type:
wc -l cracked_hashes_*
 wc -l cracked_hashes_*
 0 cracked_hashes_AFS
 0 cracked_hashes_BF
 0 cracked_hashes_BSDI
 5 cracked_hashes_DES
 4 cracked_hashes_LM
 1 cracked_hashes_MD5
10 total
On first glance, this looks good.
However, I know I included 6 DES hashes (one duplicate).
:10xCP/g3c1sQc
:10xCP/g3c1sQc
Just 5 of these appear in cracked_hashes_DES, because the duplicate
as been removed.
I'm not sure if this is unintended or not.
f a user wants to remove cracked hashes, but nevertheless
ontinue to use --single mode, keeping the duplicates might be better.)

o, where does the additional hash come from?
I included 2 LM hashes:
:$LM$44efce164ab921ca
0:$LM$b757bf5c0d87772f
cracked_hashes_LM, however, contains (in addition to the expected content):
:2:$LM$be56e057f20f883e
:1:$LM$e10adc3949ba59ab
These 2 additional lines are the first and second half of the hash
10adc3949ba59abbe56e057f20f883e in line 9 of my original
racked_hashes file.
While john stores LM hashes with a preceding $LM$ marker,
he algorithm internally accepts output generated by other tools.
hat's why there's an ambiguity.)
e10adc3949ba59abbe56e057f20f883e is a raw-MD5 hash which didn't
ppear in any cracked_hashes_* file, because I just used the format list
f the unpatched john.
Using the complete list:
 for f in DES BSDI MD5 BF AFS LM NT XSHA PO raw-MD5 MD5-gen \
 IPB2 raw-sha1 md5a hmac-md5 phpass-md5 KRB5 bfegg \
 nsldap ssha openssha oracle oracle11 MYSQL \
 mysql-sha1 mscash lotus5 DOMINOSEC \
 NETLM NETNTLM NETLMv2 NETNTLMv2 NETHALFLM \
 mssql mssql05 epi phps mysql-fast pix-md5 sapG \
 sapB md5ns HDAA DMD5 crypt
 do
 ./john --format=$f --show=LEFT cracked_hashes > cracked_hashes_$f
 done
produces this output (to stderr):
Generic crypt(3) module: hash encoding string length 20, type id $L
ppears to be unsupported on this system; will not load such hashes.
eneric crypt(3) module: hash encoding string length 32, type id #0
ppears to be unsupported on this system; will not load such hashes.
And this list of files:
$ wc -l cracked_hashes_*
 0 cracked_hashes_AFS
 0 cracked_hashes_BF
 0 cracked_hashes_bfegg
 0 cracked_hashes_BSDI
 6 cracked_hashes_crypt
 5 cracked_hashes_DES
 0 cracked_hashes_DMD5
 0 cracked_hashes_DOMINOSEC
 0 cracked_hashes_epi
 0 cracked_hashes_HDAA
 0 cracked_hashes_hmac-md5
 0 cracked_hashes_IPB2
 0 cracked_hashes_KRB5
 4 cracked_hashes_LM
 1 cracked_hashes_lotus5
 1 cracked_hashes_MD5
 0 cracked_hashes_md5a
 0 cracked_hashes_MD5-gen
 0 cracked_hashes_md5ns
 1 cracked_hashes_mscash
 0 cracked_hashes_mssql
 0 cracked_hashes_mssql05
 0 cracked_hashes_MYSQL
 0 cracked_hashes_mysql-fast
 0 cracked_hashes_mysql-sha1
 0 cracked_hashes_NETHALFLM
 0 cracked_hashes_NETLM
 0 cracked_hashes_NETLMv2
 0 cracked_hashes_NETNTLM
 0 cracked_hashes_NETNTLMv2
 0 cracked_hashes_nsldap
 0 cracked_hashes_NT
 0 cracked_hashes_openssha
 0 cracked_hashes_oracle
 0 cracked_hashes_oracle11
 0 cracked_hashes_phpass-md5
 0 cracked_hashes_phps
 0 cracked_hashes_pix-md5
 0 cracked_hashes_PO
 1 cracked_hashes_raw-MD5
 0 cracked_hashes_raw-sha1
 0 cracked_hashes_sapB
 0 cracked_hashes_sapG
 0 cracked_hashes_ssha
 0 cracked_hashes_XSHA
19 total
A mysteriously increased number of hashes?
$ sort -u cracked_hashes_*|wc -l
In total I have 12 different hashes.
Several hashes appear to be valid for multiple hash types.
$ sort cracked_hashes_*|uniq -c |grep -v "^ *1 "
     2 2:10xCP/g3c1sQc
     2 3:20ewVEw7R2GAw
     2 4:10vrzSg43HfWI
     2 6:10.6.TrD/0sas
     2 7:trEJ1uz6ul/WU
     2 8:$1$12$1YZMQPfPxS3.kStGKUBCO.
     2 9:e10adc3949ba59abbe56e057f20f883e

hese are the duplicates.
e10adc3949ba59abbe56e057f20f883e appears twice,
ecause it is valid for lotus5 and raw-MD5.
Additionally, it has been stored in cracked_hashes_mscash as
:M$9#e10adc3949ba59abbe56e057f20f883e.)
And crypt recognizes all hash types supported by your system, see
an 3 crypt

hat means you could exclude crypt from the list of "hash formats",
nless you used john --format=crypt to crack hashes not currently
upported by an individual implementation (SHA-256 or SHA-512).
I didn't include any SHA-256 or SHA-512 hash.
fter removing cracked_hashes_crypt, these hashes remain:
$ $ sort -n cracked_hashes_*
:$LM$44efce164ab921ca
:10xCP/g3c1sQc
:20ewVEw7R2GAw
:10vrzSg43HfWI
:10.6.TrD/0sas
:trEJ1uz6ul/WU
:$1$12$1YZMQPfPxS3.kStGKUBCO.
:1:$LM$e10adc3949ba59ab
:2:$LM$be56e057f20f883e
:e10adc3949ba59abbe56e057f20f883e
:e10adc3949ba59abbe56e057f20f883e
:M$9#e10adc3949ba59abbe56e057f20f883e
0:$LM$b757bf5c0d87772f
Line 5 of my original cracked_hashes cracked hashes file disappeared
same hash as in line 2).
Line 9 produced 5 lines of "output", 4 of them unwanted:
he 2 lines in cracked_hashes_LM, one in cracked_hashes_mscash, and
ither the one in cracked_hashes_lotus5 or the one in
racked_hashes_raw-MD5.
ecause the hash e10adc3949ba59abbe56e057f20f883e appears
nchanged in cracked_hashes_lotus5 and in cracked_hashes_raw-MD5,
he only way to find which is the right format is:
ry to crack the password again, using the contents of your original
ohn.pot file.

Before you continue working with john, don't forget to rename
he .pot file back to john.pot.

nless I misunderstood your requirement, I think there's no need
o develop a new tool.
On the other side, a tool could remove some of the ambiguity I
entioned. But this could also be done with some more thought put
nto some scripting.)

egards, Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.