|
Message-ID: <alpine.DEB.2.11.1410061644340.10419@roameo.localdomain> Date: Mon, 6 Oct 2014 16:50:40 +0200 (CEST) From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Cracking NTP authentication hashes Hi, Latest JtR-jumbo now supports cracking NTP MD5 authentication hashes. https://github.com/magnumripper/JohnTheRipper $ ../run/ntp2john.py NTP_with_MD5_key_foobar.pcap > ntp-hash Sample .pcap can be downloaded from the http://wiki.wireshark.org/NTP page. $ ../run/john ntp-hash -w=wordlist.txt Loaded 1 password hash (dynamic_1016 [md5($s.$p) (long salt) 128/128 AVX 480x4x3]) Will run 8 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status foobar (1) $ OMP_NUM_THREADS=2 ../run/john --test --format=dynamic_1016 Will run 2 OpenMP threads Benchmarking: dynamic_1016 [md5($s.$p) (long salt) 128/128 AVX 480x4x3]... (2xOMP) Many salts: 27463K c/s real, 13800K c/s virtual Only one salt: 20834K c/s real, 10417K c/s virtual Thanks Jim for the dynamic format :-) Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.