|
Message-ID: <CANO7a6zO1Gz4JivGAzVV=oiXQ_k7ZNtOT9g6qj7YBhUqU9ULAw@mail.gmail.com> Date: Mon, 18 Jun 2012 11:28:40 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Cracking ODF files with JtR Hi, I have committed a patch (to magnum-jumbo repository) to crack pre-1.2 ODF documents (OpenOffice / LibreOffice files) with JtR. Usage: 1. run odf2john.py on pre-1.2 ODF files (which use Blowfish encryption). 2. Run JtR on output of odf2john.py. Performance on i3-2120 CPU, $ ../run/john -format=odf -t Benchmarking: ODF [32/64]... DONE Raw: 1316 c/s real, 1316 c/s virtual ODF format uses PBKDF2 with 1024 iterations, hence it is another candidate for GPU implementation. AES support is currently TODO (patches are welcome). Note: magnum-jumbo repository can be cloned from https://github.com/magnumripper/magnum-jumbo -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.