Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <BAY101-F13976EEA8CF5890D62954ADCCE0@phx.gbl>
Date: Sat, 08 Apr 2006 15:42:18 +0000
From: "jay rubin" <cjride@...mail.com>
To: john-users@...ts.openwall.com
Subject: help me understand password cracking

Solar Designer-

Could you help me understand exactly what it is that john does.

In the README for pwpump2 it has the statement:

This is an application which dumps the password hashes (OWFs) from NT's SAM 
database, whether or not SYSKEY is enabled on the system.

Okay OWF is one way function.  I really get the feeling that pwpump has 
dumped from the SAM database the result of the password after it has passed 
through the hashing algorithm.  Or has it dumped the algorithm that was used 
to create the encrypted password?  This second option doesn't make sense 
because than what would jtr be comparing to it's results.

Now what does jtr do to decrypt the password?  Does john know the hashing 
algorithm and just pass every canidate password combination through the 
hashing algorithm until it gets one that matches the dump from pwdump2? Or 
what?

Thanks again you've been a wonderful help to me.

-Jay


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.