Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-id: <05EC1D20-ADA3-4764-B408-B160330BBB94@erols.com>
Date: Tue, 22 Feb 2011 21:13:37 -0500
From: Erik Winkler <ewinkler@...ls.com>
To: john-users@...ts.openwall.com
Subject: Oracle Hash Crack - Possible Bug

There is a crashing bug in the current oracle (Oracle10) hash cracking code (jumbo-12).  It occurred for me on both MacOSX and Windows versions of john.

It is tough to reproduce as it only occurs when performing a dictionary attack and only with certain dictionary files (larger, more complex ones like mangled.lst).

I was able to use the attached oracle_fmt.c (found at http://kb.sted.ca:8000/browser/oracle-hash/trunk/oracle_fmt.c?rev=152) to eliminate the crash.  As this is a bug fixed version of Simon's original 2004 code, I am not sure if there are additional bugs in this version, but you can certainly test it and let me know.

This version is definitely different from the version in jumbo-12.  Any comments are welcome.

Regards,
Erik


Download attachment "oracle_fmt.c" of type "application/octet-stream" (6402 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.