|
Message-ID: <32924.108.4.182.89.1344302716.squirrel@webmail.tuffmail.net> Date: Mon, 6 Aug 2012 21:25:16 -0400 (EDT) From: "Brad Tilley" <brad@...ystems.com> To: john-users@...ts.openwall.com Subject: Re: Aleksey's writeup for Crack Me If You Can 2012 <snip> Hey Aleksey, very nice write-up. Thanks for posting it. > I wrote gpg wrapper too but it did not handle false positives. I did > not finished gpg wrapper but we solved enough challenges. I ran into the symmetric PGP file false-positives as well and found that if you check the return code and that the output file is not zero byte, then you won't have false-positives. Not ideal, but it works. Here's an example: #!/bin/bash # A script to brute-force symmetric PGP/GPG files # Gets about 285 words per second on my laptop # usage: gpg.sh file.gpg file=$1 out=gpg.txt for word in $(wm --low --words /home/rbt/words/common.txt); do echo "${word}" && echo -n "${word}" | gpg -d --passphrase-fd=0 --no-tty $file > $out; # if gpg returns 0 and if the output is more than 0 bytes, then stop if [ $? -eq 0 ]; then if [ -s $out ]; then echo "GOT IT: ${word}"; exit 0; fi fi done; exit 1;
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.