|
Message-ID: <CANO7a6xOpYjoDwwksHgUpZ8ZXThu8LLeHtS12MU=s3r6xf3c5A@mail.gmail.com> Date: Wed, 27 Jun 2012 19:05:35 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Cracking KeePass 1.x files with JtR Hi, I have committed a patch (to magnum-jumbo repository) to crack KeePass 1.x files with JtR. Usage: 0. gcc keepass2john.c -o keepass2john # this step will be integrated in john and won't be needed later 1. run keepass2john on KeePass 1.x files. 2. Run JtR on output of keepass2john Performance on AMD X3 720 CPU, $ ../run/john -format=keepass -t Benchmarking: KeePass SHA-256 AES [32/64]... DONE Raw: 38.6 c/s real, 38.6 c/s virtual ODF format uses 50,000 iterations (default value) of AES encryption of a 32-byte value. It is another candidate for GPU implementation. KeePass 2.x support is currently TODO (patches are welcome). Note: magnum-jumbo repository can be cloned from https://github.com/magnumripper/magnum-jumbo -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.