|
Message-ID: <CANO7a6zk4OLxJSfyuNUZUdyGGaV_xVtf9qgkBtnjQVaxD679AQ@mail.gmail.com> Date: Fri, 28 Dec 2018 16:35:20 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Re: Break a virtual drive On Fri, Dec 28, 2018 at 3:06 AM magnum <john.magnum@...hmail.com> wrote: > > A general question we may discuss is whether we should possibly bundle > > password reset tools and such along wth JtR (and then their discussion > > would become on-topic here), or keep JtR as a password cracker only. > > That is an interesting question: We have things like cisco2john.pl that > tries to de-obfuscate obfuscated passwords for cracking actual hashes. > That's a grey zone. Personally I'd be fine with including scripts (in > Jumbo) to de-obfuscate anything. I agree it's off-scope but it's also a > password seed issue, and as such it's totally viable. I am in favor of including such scripts in general. Some time back, I snuck in a tutorial to de-obfuscate Kerio Connect "hashes". https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/Auditing-Kerio-Connect.md Also, commercial tools like Passware already include functionality on similar lines. E.g. Passware can grab disk encryption keys from memory. Ideally, I would similar scripts/tools to be included and maintained in Volatility (https://github.com/volatilityfoundation/volatility) but I haven't looker deeper into this stuff yet. Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.