|
Message-ID: <012301cc6975$9a3fe2f0$cebfa8d0$@net> Date: Fri, 2 Sep 2011 08:38:30 -0500 From: "jfoug" <jfoug@....net> To: <john-users@...ts.openwall.com> Subject: RE: False positives on zip (aes256) You will have to hand edit the john.pot file (or remove it), if you restart. Any of the lines containing this '/zip/hackme.zip' hash, will cause john to not search for that hash, the next time it starts. I have added this as a 'wish list' item. So if we do have formats which end up outputting false ++ (and we cannot 'fix' them), then an option like this will do just what you are seeing be performed with your hard coded change. Jim. >-----Original Message----- >From: estenole lists [mailto:estenole.lists@...il.com] >Sent: Friday, September 02, 2011 6:54 AM >To: john-users@...ts.openwall.com >Subject: Re: [john-users] False positives on zip (aes256) > >Hello all, > >fully functional, at least for my specific needs .-) >(1fh8 was added serveral time to the wordlist for testing) > ># usr/src/john-1.7.8-jumbo-5/src# ../run/./john >--wordlist=/zip/listado-john.txt /zip/hachme-hash.txt >Loaded 1 password hash (zip [32/64]) >1fh8 (/zip/hackme.zip) >1fh8 (/zip/hackme.zip) >1fh8 (/zip/hackme.zip) >guesses: 3 time: 0:00:02:03 0.75% (ETA: Fri Sep 2 18:18:11 2011) c/s: >239 trying: 10rM - 10sZ >1fh8 (/zip/hackme.zip) >guesses: 4 time: 0:00:04:06 1.51% (ETA: Fri Sep 2 18:16:23 2011) c/s: >240 trying: 1jm0 - 1jnl >1pf) (/zip/hackme.zip) >guesses: 5 time: 0:00:06:08 2.24% (ETA: Fri Sep 2 18:18:39 2011) c/s: >238 trying: 1u3M - 1u4Z > > >Thank you ! > >2011/9/2 estenole lists <estenole.lists@...il.com> > >> >> Hello, >> >> seems like the problem was on ldr_remove_hash(crk_db, salt, pw) inside >> crk_process_guess .-))) >> >> >> static int crk_process_guess(struct db_salt *salt, struct db_password >*pw, >> int index) >> { >> int dupe; >> char *key; >> >> dupe = !memcmp(&crk_timestamps[index], &status.crypts, >> sizeof(int64)); >> crk_timestamps[index] = status.crypts; >> >> key = crk_methods.get_key(index); >> >> log_guess(crk_db->options->flags & DB_LOGIN ? pw->login : "?", >> dupe ? NULL : pw->source, key, >> crk_db->options->field_sep_char); >> >> crk_db->guess_count++; >> status.guess_count++; >> >> if (crk_guesses && !dupe) { >> strnfcpy(crk_guesses->ptr, key, >> crk_params.plaintext_length); >> crk_guesses->ptr += crk_params.plaintext_length; >> crk_guesses->count++; >> } >> >> /*ldr_remove_hash(crk_db, salt, pw);*/ >> >> if (!crk_db->salts) >> return 1; >> >> crk_init_salt(); >> >> return 0; >> } >> >> >> Thank you >> >> >> >> 2011/9/2 estenole lists <estenole.lists@...il.com> >> >>> >>> Hello, >>> >>> ive tried it without suceess, it stops on the first key it finds. Ive >been >>> makeing some tests >>> and seems like i should modify the function crk_process_gues called >from >>> cracker.c. My C >>> knowledge is limited, but that function make some changes that affect >the >>> rest of the bufferered >>> keys os any other value. >>> >>> >>> if (crk_methods.cmp_exact(pw->source, index)) { >>> if (crk_process_guess(salt, pw, >index)) >>> -> return 1; >>> else >>> break; >>> } >>> >>> } while ((pw = pw->next)); >>> >>> >>> Ive tried some modifications, but after crk_process_gues the program >>> exits. I tried to modify some >>> calls before but i ended on a Segmen segfault errors. >>> >>> Ill let you know if im able to get it working. >>> >>> Thank you ! >>> >>> >>> >>> >>> 2011/9/1 jfoug <jfoug@....net> >>> >>>> You will have to 'change' the zip format source file to do this. >Change >>>> the >>>> cmp_exact to this (NOTE I have not tested, just coding in the email) >>>> >>>> static int cmp_exact(char *source, int index) >>>> { >>>> static int cnt=0; >>>> if (++cnt < 13) // we have to 'pass' the self tests. >>>> return has_been_cracked[index]; >>>> cnt = 20; // to make sure we do not 'wrap' cnt past the end >of a >>>> 2^31 number to a negative number >>>> if (has_been_cracked[index]) { >>>> fprintf(stderr, "\nPossible pass: %s Hash=%s\n\n", >>>> saved_key[index], source); >>>> log_event("++ Possible pass: [%s]", >saved_key[index]); >>>> } >>>> return 0; >>>> } >>>> >>>> Then you can see them show up on the screen output, and also in the >>>> john.log >>>> file. These can then be tested after the run. >>>> >>>> NOTE, this method will cause john to NEVER find the password. It >simply >>>> informs you in output that a possible password was seen. The right >one >>>> will >>>> be output, along with any false positives. >>>> >>>> Jim. >>>> >>>> >From: estenole lists [mailto:estenole.lists@...il.com] >>>> > >>>> >Hello all, >>>> > >>>> >im using the latest John the Ripper >>>> >1.7.8-jumbo-5<http://www.openwall.com/john/g/john-1.7.8-jumbo- >5.tar.gz> >>>> >version >>>> >for trying to get the key of a zip encrypted >>>> >with aes256 bit. I allready know that actuallty false positives are >>>> >common >>>> >at this time. >>>> > >>>> >THe problem is tha when processing the wordlist john stops as soon >as a >>>> >key >>>> >is found, but at the moment >>>> >none on them works, what i want to achieve is to force john to try >with >>>> >the >>>> >full wordlist while printing >>>> >the keys found so i can try them when finished. Could find any >option or >>>> >configuration to do so, do you >>>> >know id theres such a possiblity ? >>>> > >>>> >Thank you >>>> >>>> >>> >>
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.