|
Message-ID: <alpine.DEB.2.11.1410061109430.7542@roameo.localdomain> Date: Mon, 6 Oct 2014 11:34:54 +0200 (CEST) From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com cc: spirosfr.1985@...il.com Subject: Cracking VRRP and GLBP hashes Hej! Recently, I worked with Spiros Fraganastasis to add support for cracking VRRP and GLBP hashes (some weird Cisco proprietary protocols). $ ../run/glbp2john.py 10-0.0-1412077029.pcap > glbp-hashes $ ../run/john glbp-hashes -w=wordlist.txt Loaded 36 password hashes with 36 different salts (hsrp, ... Press 'q' or Ctrl-C to abort, almost any other key for status password12345 (56) password12345 (54) $ ../run/vrrp2john.py 20-0.0-1412012695.pcap > vrrp-hashes $ ../run/john vrrp-hashes -w=wordlist.txt Loaded 1 password hash (hsrp, "MD5 authentication" HSRP, ... Press 'q' or Ctrl-C to abort, almost any other key for status password12345 (768) $ OMP_NUM_THREADS=2 ../run/john --test --format=hsrp Will run 2 OpenMP threads Benchmarking: hsrp, "MD5 authentication" HSRP, VRRP, GLBP [MD5 32/64]... Many salts: 5197K c/s real, 2598K c/s virtual Only one salt: 4866K c/s real, 2433K c/s virtual Yes, at some point, we discovered that it is possible to use the existing "hsrp" format to crack the newer hash types. ... We have more proprietary hashes to reverse (and could always use more hands). https://github.com/magnumripper/JohnTheRipper/issues At some point, we will also be writing patches to enhance Loki to attack the authenticated versions of the different Cisco protocols. https://github.com/kholia/Loki (Git mirror of the original Loki project). Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.