|
Message-ID: <CANWtx01vq7vRBOvbySqjCLXOvPMs+NMrMFfisjNDsDNHQkM0QQ@mail.gmail.com> Date: Tue, 7 Feb 2012 18:48:00 -0500 From: Rich Rumble <richrumble@...il.com> To: john-users@...ts.openwall.com, definitely crashing <slowlydryingup@...il.com> Subject: Re: DES - not "traditional DES-based" - (VNC hash) with JtR On Tue, Feb 7, 2012 at 5:28 PM, A BC <miaou.pbl@...il.com> wrote: > Thank you all for your answers. > > Rich, thanks for the link. Alexander made it clearer I want to unhash a > challenge/response that has already been sniffed. I wish I may use that to > gain an access to the machine... > But I did not knew that VNC store localy the access-pwd only encrypted with > a DES-like with a fixed "secret" key... I've sent an email to john-dev already containing pcap's of 7 different vnc sessions, using 3 different VNC protocols (see wikipedia) http://en.wikipedia.org/wiki/RFB_protocol#Protocol_versions >> Oh, and please post a test vector or several (sniffed challenge/response >> pairs and their corresponding known passwords). You can get them here: http://xinn.org/jtr-pcap/jtr-vnc-pcap.tar.gz > I am building a FakeServer to obtain them : I installed vinagre, which I > connect to the server. The server gives him a challenge, vinagre asks for a > pass, responds to the server. The response IS ok. There is an old project called VNCcrack, I compiled it today but I didn't work on the pcap's I gave it, which could be due to a wide range of reasons. Nonetheless it might give you a head start on your project: http://www.randombit.net/code/vnccrack/ -rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.