|
Message-ID: <2aec14e6e4e412e1a8b5b99526045720@smtp.hushmail.com> Date: Wed, 12 Jun 2013 21:57:12 +0200 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: KDE Paste Applet external mode On 11 Jun, 2013, at 6:22 , Michael Samuel <mik@...net.net> wrote: > This takes advantage of CVE-2013-2120 to find seeds that KDE Paste applet > uses to generate passwords. How long has KDE Paste been using this weak generation? For raw-md5 we can brute-force a whole year per CPU core and hour so it would be nice to know the lowest "possible" startTime. BTW I tried disabling upper-case letters and the number of candidates did not change. I assume this means you need to run it with exactly the character classes the target was using, right? magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.