Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx01vq7vRBOvbySqjCLXOvPMs+NMrMFfisjNDsDNHQkM0QQ@mail.gmail.com>
Date: Tue, 7 Feb 2012 18:48:00 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com, 
	definitely crashing <slowlydryingup@...il.com>
Subject: Re: DES - not "traditional DES-based" - (VNC hash) with JtR

On Tue, Feb 7, 2012 at 5:28 PM, A BC <miaou.pbl@...il.com> wrote:
> Thank you all for your answers.
>
> Rich, thanks for the link. Alexander made it clearer I want to unhash a
> challenge/response that has already been sniffed. I wish I may use that to
> gain an access to the machine...
> But I did not knew that VNC store localy the access-pwd only encrypted with
> a DES-like with a fixed "secret" key...
I've sent an email to john-dev already containing pcap's of 7 different
vnc sessions, using 3 different VNC protocols (see wikipedia)
http://en.wikipedia.org/wiki/RFB_protocol#Protocol_versions
>> Oh, and please post a test vector or several (sniffed challenge/response
>> pairs and their corresponding known passwords).
You can get them here: http://xinn.org/jtr-pcap/jtr-vnc-pcap.tar.gz
> I am building a FakeServer to obtain them : I installed vinagre, which I
> connect to the server. The server gives him a challenge, vinagre asks for a
> pass, responds to the server. The response IS ok.
There is an old project called VNCcrack, I compiled it today but
I didn't work on the pcap's I gave it, which could be due to
a wide range of reasons. Nonetheless it might give you a head
start on your project: http://www.randombit.net/code/vnccrack/
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.