Dhiru Kholia
2014-09-02 07:47:43 UTC
Hi,
I have added support for cracking HSRP MD5 authentication "hashes" to
JtR-jumbo (in the bleeding-jumbo branch), which you can get from the
following URL,
https://github.com/magnumripper/JohnTheRipper
$ python ../run/hsrp2john.py HSRP-auth-md5-openwall.pcap > hsrp-hashes
$ ../run/john hsrp-hashes -w=wordlist
Loaded 5 password hashes with 5 different salts (hsrp, HSRP MD5 ...)
openwall (?)
...
$ OMP_NUM_THREADS=2 ../run/john --format=hsrp --test # i7-4750HQ
Will run 2 OpenMP threads
Benchmarking: hsrp, HSRP MD5 authentication [MD5 32/64]...
Many salts: 5240K c/s real, 2620K c/s virtual
Only one salt: 4503K c/s real, 2263K c/s virtual
Sample .pcap files are available on the https://github.com/kholia/my-pcaps
page. This repository also documents the reversing process for fun.
Dhiru
I have added support for cracking HSRP MD5 authentication "hashes" to
JtR-jumbo (in the bleeding-jumbo branch), which you can get from the
following URL,
https://github.com/magnumripper/JohnTheRipper
$ python ../run/hsrp2john.py HSRP-auth-md5-openwall.pcap > hsrp-hashes
$ ../run/john hsrp-hashes -w=wordlist
Loaded 5 password hashes with 5 different salts (hsrp, HSRP MD5 ...)
openwall (?)
...
$ OMP_NUM_THREADS=2 ../run/john --format=hsrp --test # i7-4750HQ
Will run 2 OpenMP threads
Benchmarking: hsrp, HSRP MD5 authentication [MD5 32/64]...
Many salts: 5240K c/s real, 2620K c/s virtual
Only one salt: 4503K c/s real, 2263K c/s virtual
Sample .pcap files are available on the https://github.com/kholia/my-pcaps
page. This repository also documents the reversing process for fun.
Dhiru