|
Message-ID: <BLU0-SMTP151CFE04116F96730210386FD3B0@phx.gbl> Date: Fri, 13 Apr 2012 21:27:58 +0200 From: Frank Dittrich <frank_dittrich@...mail.com> To: john-users@...ts.openwall.com Subject: Re: automation equipped working place of hash cracker, proposal On 04/13/2012 03:11 PM, Simon Marechal wrote: > On 09/04/2012 21:55, Frank Dittrich wrote: >> To get the discussion going, may be you could elaborate a bit: > > I will try to actually get it going by adding some notes ;) > >> What would an optimal work flow look like? > > This is the central question. I don't believe there is such a thing as > an optimal work flow as it will depend on what you want to achieve : > single user with multiple computing resources, several users sharing a > single compute platform, local or remote usage, access control, etc. In addition to that, as long as you don't have any knowledge about what to expect, and you don't yet have any passwords cracked, you can only start working based on experience you gained in previous cracking sessions, contests, and so on, and adjust your strategy depending on your findings during the cracking session. > Describing a good workflow for the challenge would be perfectly acceptable. Especially if you consider that a good workflow for the challenge is in many aspects more complicated than a cracking session of a single user with multiple computing resources or a team of pen testers working together in a real-life scenario: The available hardware, OS, and software versions will usually be much less uniform. People will probably even use different john versions (core or jumbo with different release dates, compiler flags, ... It might be best to make it easy for people to use the same version, and reasonable config option, etc. You should, however, allow people to contribute even if they use somewhat different setups - but in this case, the integration into the "automation" of new cracking attempts might not be possible. It is less predictable what hardware will be available at which time. You have much less influence on what people do during the contest than you have in a team of pen testers... (After all, many people will just take part in the challenge because they think it is fun, and they'll avoid doing things which they don't see as "having fun", even if this might result in trying out things that are less than optimal. Many people will be behind a firewall or router which prevents access from outside (e.g., a central server), others might not want to grant other people or a central server access to their systems, so you might have to find ways to allow people fetching the next tasks to be processed and sending back the results on their own. If you are paranoid enough, you might even consider some kind of detection of "malevolent contributors", who fetch tasks from the central server, but submit faked results (e.g., not sending back all the cracked hashes of wrong passwords). OTOH, you probably can't prevent those people from just fetching the cracked passwords and submitting them for other teams - otherwise you would also prevent team members from looking at cracked passwords to detect patterns for possible future attacks. In the past, people didn't always start with a new installation. Instead, they accidentally submitted .pot files containing hashes and passwords from earlier cracking sessions. You might not only want to filter out these passwords from submitting them to KoreLogic, but also from distribution to other team members. If you want people to work together as effectively as reasonably possible during the contest, you'll have to make "doing the right thing" easy and enjoyable for them. Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.