|
Message-ID: <CANO7a6xtbK5Meipnbqe7LFnZM=gXUUc=0fGvL-KiX7OSVH0HVg@mail.gmail.com> Date: Fri, 20 Jul 2012 21:23:04 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-users@...ts.openwall.com Subject: Cracking 1Password Agile Keychain files with JtR! Hi, I have committed a patch (to magnum-jumbo repository) to crack 1Password Agile Keychain files. Usage: 1. Run agilekc2john.py on 1Password Agile Keychain files. 2. Run JtR on output of agilekc2john.py Performance on AMD X3 720 CPU, $ ../run/john -fo:agilekeychain -t Benchmarking: 1Password Agile Keychain PBKDF2-HMAC-SHA-1 AES [32/64]... (3xOMP) DONE Raw: 4473 c/s real, 1515 c/s virtual 1Password Agile Keychain is very similar (functionality / concept wise) to OS X Keychain. It uses PBKDF2-SHA1 with 1,000 iterations and AES-128 in CBC mode. Cracking speeds are almost same as OS X Keychain cracking speeds. The format scales almost linearly with number of cores (Thanks to Lukas!). This work is based on agilekeychain program (https://bitbucket.org/gwik/agilekeychain code) written by Antonin Amand. GPU support is trvial to implement and will be done soon (expected speedup > 100x). Note: magnum-jumbo repository can be cloned from https://github.com/magnumripper/magnum-jumbo -- Cheers, Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.