Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CANWtx03Lwk6G4ABmt+_9k_tV9vXZNeY4uzMNL2bzDDEQTC2XeA@mail.gmail.com>
Date: Tue, 14 Jan 2014 16:03:45 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking MSChap v2

On Tue, Jan 14, 2014 at 3:37 PM, magnum <john.magnum@...hmail.com> wrote:
> It would be easy to output the last two octets (of 16), but that would be
> pointless. Brute forcing the full NT hash *instead* of guessing passwords
> would mean up to 2^56 rounds of DES, perhaps roughly 2^55 on average. I
> think that would take a day or so on an eight core. If the password is
> uncrackable it might be meaningful but it's out of scope for JtR.
Right, and a Tool's branch sounds neat, but might get stagnate. We do
have all those "something_2john" scripts, which may qualify as tools,
so who knows.And again I agree it's not typical of JtR to do,  but
perhaps it sparks someone to take more interest in JtR development.
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.