|
Message-ID: <20110609014506.GA3272@openwall.com> Date: Thu, 9 Jun 2011 05:45:06 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com, announce@...ts.openwall.com Subject: JtR 1.7.7-jumbo-6 Hi, John the Ripper 1.7.7-jumbo-6 is out: http://www.openwall.com/john/ http://www.openwall.com/john/#contrib This community-enhanced release integrates preliminary support for several non-hashes, implemented under Dhiru Kholia's GSoC 2011 project. Specifically, it supports cracking of OpenSSH's passphrase-protected SSH protocol 2 private keys, password-protected PDF files with 40-bit and 128-bit RC4 encryption, and some password-protected RAR archives. For SSH keys, typical speeds are hundreds of thousands of combinations per second - e.g., I measured 580k c/s during actual cracking on a dual Xeon E5420 2.5 GHz, with an OpenMP-enabled build. If you have a weak passphrase on one of your private keys - beware. Yes, Dhiru's SSH key cracker includes OpenMP parallelization. There's a limitation, though: this requires OpenSSL 1.0.0 or newer, for thread-safety of the interfaces being used. When building or running with older versions of OpenSSL, OpenMP parallelization in the SSH cracker is automatically disabled. (You can always use MPI instead.) Besides the non-hashes, 1.7.7-jumbo-6 integrates support for password hashes of Sybase ASE (also by Dhiru), hmailserver (by James Nobis), and MediaWiki "B" type (by JimF). The first two of these are disabled at compile-time by default; to enable, edit the Makefile to add the commented-out -DHAVE_OPENSSL_SHA256 to CFLAGS (requires OpenSSL 0.9.8 or newer, whereas the rest of jumbo patch also works with 0.9.7). As usual, we've added many minor enhancements as well, such as to ETA display and to the "unique" program. Enjoy, and provide your feedback (on john-users). Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.