Taggat med: jtr

Ny version av John the Ripper

John the Ripper

Det var över 4 år sedan en ny version av programvaran John the Ripper (JtR) släpptes. JtR är en av mina favoritverktyg när det gäller att knäcka lösenord (tätt följt av hashcat).

Den nya versionen heter John the Ripper 1.9.0-jumbo-1 och över 6000 commits ligger bakom denna release.

Nyheterna är bl.a. följande:

  • Snabbare och effektivare inläsning av mycket stora lösenordsfiler
  • Stöd för 7 st hash-typer i FPGA:n ZTEX 1.15y
  • Inget mer stöd för CUDA. Istället satsas på OpenCL
  • Och på tal om OpenCL så supportas 88 algoritmer, se listan med –list=formats –format=opencl
  • För CPU-knäckning (till skillnad mot GPU) så stödjs hela 407 olika format
  • AES-NI instruktioner används i större omfattning

Du kan ladda hem JtR här:

John the Ripper 1.7.7

Nu har den populära knäckningsprogrammvaran John the Ripper släppts i en ny version, nämligen 1.7.7.

Ändringar är enligt följande (på engelska):

* Added Intel AVX and AMD XOP instruction sets support for bitslice DES (with C compiler intrinsics). New make targets: linux-x86-64-avx, linux-x86-64-xop, linux-x86-avx, and linux-x86-xop (these require recent versions of GCC and GNU binutils).
* A ”dummy” ”format” is now supported (plaintext passwords encoded in hexadecimal and prefixed with ”$dummy$”) – for faster testing and tuning of custom wordlists, rule sets, .chr files, and external modes on already known or artificial passwords, as well as for testing of future and modified versions of John itself.
* Apache ”$apr1$” MD5-based password hashes are now supported along with the FreeBSD-style MD5-based crypt(3) hashes that were supported previously. Hashes of both of these types may be loaded for cracking simultaneously.
* The ”–salts” option threshold is now applied before removal of previously cracked hashes for consistent behavior with interrupted and continued sessions.
* The ”Idle = Y” setting (which is the default) is now ignored for OpenMP-enabled hash types when the actual number of threads is greater than 1. (Unfortunately, it did not work right at least with GNU libgomp on Linux.)
* When a cracking session terminates or is interrupted, John will now warn the user if the cracked passwords printed to the terminal while cracking are potentially incomplete. It will advise the user to use the ”–show” option to see the complete set of cracked passwords with proper post-processing.
* When loading hashes specified on a line on their own (feature introduced in 1.7.6), the loader will now ignore leading and trailing whitespace.
* Unless a hash type is forced from the command line, the loader will now print warnings about additional hash types seen in the input files (beyond the hash type autodetected initially).
* For use primarily by the jumbo patch (and later by future enhancements to the official versions as well), the loader now includes logic to warn the user of ambiguous hash encodings (e.g. LM vs. NTLM vs. raw-MD5, all of which may be represented as 32 hexadecimal characters) and of excessive partial hash collisions, which it works around (these are typically caused by an incomplete implementation of a new hash type).
* The ”unique” and ”unshadow” programs have been made significantly faster.
* ”DateTime”, ”Repeats”, ”Subsets”, ”AtLeast1-Simple”, ”AtLeast1-Generic”, and ”Policy” external mode samples have been added to the default john.conf.
* The self-tests have been enhanced to detect more kinds of program bugs.
* A few minor bug fixes and enhancements were made.

John the Ripper 1.7.7 kan ladda hem här:

John the Ripper

En ny version av den omåttligt populära programmvaran John the Ripper av Solar Designer har nu kommit i version 1.7.3.1 och räknas som ”development version”.

Fokus på denna release har varit att förbättra x86-64 stödet. Det går nu att testa två blowfish hashar samtidigt:

Most notably, two Blowfish-based crypt(3) hashes may now be computed in
parallel for much better performance on x86-64 CPUs (on Intel Core 2 and
AMD CPUs tested, the speedup was 50% to 65%)

Läs mer på JtR:s hemsida: http://www.openwall.com/john/