|
Message-ID: <CANO7a6yECnsREuqKJkZGf9nxNQyAi+1se2L4=9FRW-bRT01-aQ@mail.gmail.com> Date: Mon, 12 Mar 2012 21:50:56 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Re: Re: Cracking RACF passwords On Mon, Mar 12, 2012 at 8:15 PM, Andres Ederra <andres.ederra@...il.com> wrote: > Hi Alexander (and all), > > Anyway as far as I have investigated the issue the problem is to learn > the RACF algorithm, coding it as a john module its a no-issue. > > I'm afraid that the people who know that info maybe retired (or > dead...) and IBM is not going to collaborate that much (I would want > to be wrong but...) Thanks to Nigel and Main Framed, RACF algorithm is now *known*. A JtR module has also been written (Check https://github.com/magnumripper/magnum-jumbo). The only part remaining is converting RACF binary database(s) into a format usable by JtR (i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt file from input RACF database), cracf2john.py (for CRACF.txt to JtR suitable conversion) and finally JtR to audit mainframe passwords. -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.