|
Message-ID: <20120312165032.GA30674@openwall.com> Date: Mon, 12 Mar 2012 20:50:32 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Cracking RACF passwords On Mon, Mar 12, 2012 at 09:50:56PM +0530, Dhiru Kholia wrote: > Thanks to Nigel and Main Framed, RACF algorithm is now *known*. A JtR > module has also been written (Check > https://github.com/magnumripper/magnum-jumbo). The only part remaining > is converting RACF binary database(s) into a format usable by JtR > (i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt > file from input RACF database), cracf2john.py (for CRACF.txt to JtR > suitable conversion) and finally JtR to audit mainframe passwords. Wow. Thank you! $ GOMP_SPINCOUNT=2000000 ./john -te=1 -fo=racf Benchmarking: RACF [32/64]... (8xOMP) DONE Raw: 7357K c/s real, 968602 c/s virtual The OpenMP performance is unstable, though. And you need to add the proper sets of binary_hash and get_hash functions for scalability to large numbers of hashes loaded for cracking at once. And this is another candidate for conversion to usage of bitslice DES (instead of OpenSSL's). But overall this is very good news! Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.