|
|
Message-ID: <CALrQjmVDNLK7aTOCQMRyRGxbOvjckN-DG89hVJCv8XGfiy_piQ@mail.gmail.com>
Date: Fri, 2 Sep 2011 13:53:41 +0200
From: estenole lists <estenole.lists@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: False positives on zip (aes256)
Hello all,
fully functional, at least for my specific needs .-)
(1fh8 was added serveral time to the wordlist for testing)
# usr/src/john-1.7.8-jumbo-5/src# ../run/./john
--wordlist=/zip/listado-john.txt /zip/hachme-hash.txt
Loaded 1 password hash (zip [32/64])
1fh8 (/zip/hackme.zip)
1fh8 (/zip/hackme.zip)
1fh8 (/zip/hackme.zip)
guesses: 3 time: 0:00:02:03 0.75% (ETA: Fri Sep 2 18:18:11 2011) c/s:
239 trying: 10rM - 10sZ
1fh8 (/zip/hackme.zip)
guesses: 4 time: 0:00:04:06 1.51% (ETA: Fri Sep 2 18:16:23 2011) c/s:
240 trying: 1jm0 - 1jnl
1pf) (/zip/hackme.zip)
guesses: 5 time: 0:00:06:08 2.24% (ETA: Fri Sep 2 18:18:39 2011) c/s:
238 trying: 1u3M - 1u4Z
Thank you !
2011/9/2 estenole lists <estenole.lists@...il.com>
>
> Hello,
>
> seems like the problem was on ldr_remove_hash(crk_db, salt, pw) inside
> crk_process_guess .-)))
>
>
> static int crk_process_guess(struct db_salt *salt, struct db_password *pw,
> int index)
> {
> int dupe;
> char *key;
>
> dupe = !memcmp(&crk_timestamps[index], &status.crypts,
> sizeof(int64));
> crk_timestamps[index] = status.crypts;
>
> key = crk_methods.get_key(index);
>
> log_guess(crk_db->options->flags & DB_LOGIN ? pw->login : "?",
> dupe ? NULL : pw->source, key,
> crk_db->options->field_sep_char);
>
> crk_db->guess_count++;
> status.guess_count++;
>
> if (crk_guesses && !dupe) {
> strnfcpy(crk_guesses->ptr, key,
> crk_params.plaintext_length);
> crk_guesses->ptr += crk_params.plaintext_length;
> crk_guesses->count++;
> }
>
> /*ldr_remove_hash(crk_db, salt, pw);*/
>
> if (!crk_db->salts)
> return 1;
>
> crk_init_salt();
>
> return 0;
> }
>
>
> Thank you
>
>
>
> 2011/9/2 estenole lists <estenole.lists@...il.com>
>
>>
>> Hello,
>>
>> ive tried it without suceess, it stops on the first key it finds. Ive been
>> makeing some tests
>> and seems like i should modify the function crk_process_gues called from
>> cracker.c. My C
>> knowledge is limited, but that function make some changes that affect the
>> rest of the bufferered
>> keys os any other value.
>>
>>
>> if (crk_methods.cmp_exact(pw->source, index)) {
>> if (crk_process_guess(salt, pw, index))
>> -> return 1;
>> else
>> break;
>> }
>>
>> } while ((pw = pw->next));
>>
>>
>> Ive tried some modifications, but after crk_process_gues the program
>> exits. I tried to modify some
>> calls before but i ended on a Segmen segfault errors.
>>
>> Ill let you know if im able to get it working.
>>
>> Thank you !
>>
>>
>>
>>
>> 2011/9/1 jfoug <jfoug@....net>
>>
>>> You will have to 'change' the zip format source file to do this. Change
>>> the
>>> cmp_exact to this (NOTE I have not tested, just coding in the email)
>>>
>>> static int cmp_exact(char *source, int index)
>>> {
>>> static int cnt=0;
>>> if (++cnt < 13) // we have to 'pass' the self tests.
>>> return has_been_cracked[index];
>>> cnt = 20; // to make sure we do not 'wrap' cnt past the end of a
>>> 2^31 number to a negative number
>>> if (has_been_cracked[index]) {
>>> fprintf(stderr, "\nPossible pass: %s Hash=%s\n\n",
>>> saved_key[index], source);
>>> log_event("++ Possible pass: [%s]", saved_key[index]);
>>> }
>>> return 0;
>>> }
>>>
>>> Then you can see them show up on the screen output, and also in the
>>> john.log
>>> file. These can then be tested after the run.
>>>
>>> NOTE, this method will cause john to NEVER find the password. It simply
>>> informs you in output that a possible password was seen. The right one
>>> will
>>> be output, along with any false positives.
>>>
>>> Jim.
>>>
>>> >From: estenole lists [mailto:estenole.lists@...il.com]
>>> >
>>> >Hello all,
>>> >
>>> >im using the latest John the Ripper
>>> >1.7.8-jumbo-5<http://www.openwall.com/john/g/john-1.7.8-jumbo-5.tar.gz>
>>> >version
>>> >for trying to get the key of a zip encrypted
>>> >with aes256 bit. I allready know that actuallty false positives are
>>> >common
>>> >at this time.
>>> >
>>> >THe problem is tha when processing the wordlist john stops as soon as a
>>> >key
>>> >is found, but at the moment
>>> >none on them works, what i want to achieve is to force john to try with
>>> >the
>>> >full wordlist while printing
>>> >the keys found so i can try them when finished. Could find any option or
>>> >configuration to do so, do you
>>> >know id theres such a possiblity ?
>>> >
>>> >Thank you
>>>
>>>
>>
>
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.