|
Message-ID: <CALrQjmUAbaNnxUf9J2WNX8zqN4tcT2TxnY9X+taVyxuudwdGWg@mail.gmail.com> Date: Fri, 2 Sep 2011 13:34:07 +0200 From: estenole lists <estenole.lists@...il.com> To: john-users@...ts.openwall.com Subject: Re: False positives on zip (aes256) Hello, ive tried it without suceess, it stops on the first key it finds. Ive been makeing some tests and seems like i should modify the function crk_process_gues called from cracker.c. My C knowledge is limited, but that function make some changes that affect the rest of the bufferered keys os any other value. if (crk_methods.cmp_exact(pw->source, index)) { if (crk_process_guess(salt, pw, index)) -> return 1; else break; } } while ((pw = pw->next)); Ive tried some modifications, but after crk_process_gues the program exits. I tried to modify some calls before but i ended on a Segmen segfault errors. Ill let you know if im able to get it working. Thank you ! 2011/9/1 jfoug <jfoug@....net> > You will have to 'change' the zip format source file to do this. Change > the > cmp_exact to this (NOTE I have not tested, just coding in the email) > > static int cmp_exact(char *source, int index) > { > static int cnt=0; > if (++cnt < 13) // we have to 'pass' the self tests. > return has_been_cracked[index]; > cnt = 20; // to make sure we do not 'wrap' cnt past the end of a > 2^31 number to a negative number > if (has_been_cracked[index]) { > fprintf(stderr, "\nPossible pass: %s Hash=%s\n\n", > saved_key[index], source); > log_event("++ Possible pass: [%s]", saved_key[index]); > } > return 0; > } > > Then you can see them show up on the screen output, and also in the > john.log > file. These can then be tested after the run. > > NOTE, this method will cause john to NEVER find the password. It simply > informs you in output that a possible password was seen. The right one > will > be output, along with any false positives. > > Jim. > > >From: estenole lists [mailto:estenole.lists@...il.com] > > > >Hello all, > > > >im using the latest John the Ripper > >1.7.8-jumbo-5<http://www.openwall.com/john/g/john-1.7.8-jumbo-5.tar.gz> > >version > >for trying to get the key of a zip encrypted > >with aes256 bit. I allready know that actuallty false positives are > >common > >at this time. > > > >THe problem is tha when processing the wordlist john stops as soon as a > >key > >is found, but at the moment > >none on them works, what i want to achieve is to force john to try with > >the > >full wordlist while printing > >the keys found so i can try them when finished. Could find any option or > >configuration to do so, do you > >know id theres such a possiblity ? > > > >Thank you > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.