Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120312165032.GA30674@openwall.com>
Date: Mon, 12 Mar 2012 20:50:32 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking RACF passwords

On Mon, Mar 12, 2012 at 09:50:56PM +0530, Dhiru Kholia wrote:
> Thanks to Nigel and Main Framed, RACF algorithm is now *known*. A JtR
> module has also been written (Check
> https://github.com/magnumripper/magnum-jumbo). The only part remaining
> is converting RACF binary database(s) into a format usable by JtR
> (i.e. racf2john utility). For now you can use CRACF (to get CRACF.txt
> file from input RACF database), cracf2john.py (for CRACF.txt to JtR
> suitable conversion) and finally JtR to audit mainframe passwords.

Wow.  Thank you!

$ GOMP_SPINCOUNT=2000000 ./john -te=1 -fo=racf
Benchmarking: RACF [32/64]... (8xOMP) DONE
Raw:    7357K c/s real, 968602 c/s virtual

The OpenMP performance is unstable, though.  And you need to add the
proper sets of binary_hash and get_hash functions for scalability to
large numbers of hashes loaded for cracking at once.  And this is
another candidate for conversion to usage of bitslice DES (instead of
OpenSSL's).

But overall this is very good news!

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.