|
Message-ID: <CANWtx02z50T+5JZiDF+NqCJuga_r9qLZipLTPqn9hQMn=QTKDA@mail.gmail.com> Date: Fri, 27 Jun 2014 10:04:55 -0400 From: Rich Rumble <richrumble@...il.com> To: john-users@...ts.openwall.com Subject: Re: Junos Pulse VPN Client (Saved Passwords) On Fri, Jun 27, 2014 at 7:32 AM, Richard B. Tilley <brad@....us> wrote: > [HKEY_CURRENT_USER\Software\Juniper Networks\Junos Pulse\User Data\ive:2eed21ed-ab06-4244-a8f6-12fa59b838a1\Password1] > > This is a REG_BINARY type. I can edit it (remove or change a byte) and the VPN connection will fail, place it back and it works again. They seem to be encrypted somehow. So I was curious if anyone on the list may have figured this format out and used John to crack them? I wonder if it's anything like the Cisco VPN passwords were: https://www.unix-ag.uni-kl.de/~massar/bin/cisco-decode (perhaps they still are, I haven't checked in a longtme) -rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.