Kerberos AS-REP Cracking
#4
Thanks for the quick replies guys, much appreciated.

I've had a good look at that OpenCL code you linked to but still struggling to wrap my head around it. Especially as I can't seem to see where where some of the parameter values are coming from. Probably just my C noobness, sorry. If anyone does understand how this format in particular is handled and fancies explaining it to me then that would be great, but no worries if not.

Looking at the perl module, I can't tell if this is just for generating a test hash for the main program to try and crack or if this is actually the routine that tests if passwords are correct? I mean I see this part:

Code:
my $check_correct  = ((substr ($ticket_decrypt, 16, 4) eq "7981" && substr ($ticket_decrypt, 22, 2) eq "30")) ||
                         ((substr ($ticket_decrypt, 16, 2) eq "79") && (substr ($ticket_decrypt, 20, 2) eq "30")) ||
                         ((substr ($ticket_decrypt, 16, 4) eq "7982")  && (substr ($ticket_decrypt, 24, 2) eq "30"));

which is obviously checking for specific values at specific points in the decrypted output. But is this just for the test module using a specific password or something so it knows these characters should always be in the result. Or is this exactly the same as what the program does to decide if the hash has been cracked?
Reply


Messages In This Thread
Kerberos AS-REP Cracking - by VbScrub - 02-21-2020, 05:15 PM
RE: Kerberos AS-REP Cracking - by undeath - 02-21-2020, 05:18 PM
RE: Kerberos AS-REP Cracking - by philsmd - 02-21-2020, 05:20 PM
RE: Kerberos AS-REP Cracking - by VbScrub - 02-21-2020, 06:51 PM
RE: Kerberos AS-REP Cracking - by philsmd - 02-21-2020, 08:17 PM
RE: Kerberos AS-REP Cracking - by VbScrub - 02-21-2020, 08:42 PM
RE: Kerberos AS-REP Cracking - by VbScrub - 02-21-2020, 08:43 PM
RE: Kerberos AS-REP Cracking - by philsmd - 02-22-2020, 10:37 AM