Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAPXMOzC0ojm+iC-yKU7epTy6ZbGSJND9+FxiUDOnA7xop6F0NQ@mail.gmail.com>
Date: Mon, 12 Mar 2012 19:10:47 +0100
From: Andres Ederra <andres.ederra@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Re: Cracking RACF passwords

Awesome work! Thanxs!

That is such a huge step forward!

I found the previous asm code I posted deep into the archive of
http://www.os390-mvs.freesurf.fr<http://www.os390-mvs.freesurf.fr/ichdex01.htm>

It shouldn't be that hard to process RACF binary database into something
john-friendly

If I get access to some of our RACF admins I can generate some racf db
dumps and build an alternative to cracf.exe ... (but that can take
months... things run slowly at corporate world...)


Best Regards

Andrés

2012/3/12 Dhiru Kholia <dhiru.kholia@...il.com>

> On Mon, Mar 12, 2012 at 8:15 PM, Andres Ederra <andres.ederra@...il.com>
> wrote:
> > Hi Alexander (and all),
> >
> > Anyway as far as I have investigated the issue the problem is to learn
> > the RACF algorithm, coding it as a john module its a no-issue.
> >
> > I'm afraid that the people who know that info maybe retired (or
> > dead...) and IBM is not going to collaborate that much (I would want
> > to be wrong but...)
>
> Thanks to Nigel and Main Framed, RACF algorithm is now *known*. A JtR
> module has also been written (Check
> https://github.com/magnumripper/magnum-jumbo). The only part remaining
> is converting RACF binary database(s) into a format usable by JtR
> (i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt
> file from input RACF database), cracf2john.py (for CRACF.txt to JtR
> suitable conversion) and finally JtR to audit mainframe passwords.
>
> --
> Cheers,
> Dhiru
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.