Posts: 9
Threads: 3
Joined: Dec 2012
MSCHAPV2 is a encrypted challenge response algorithm used extensively in Enterprise wireless networks and PPTP VPNS. Currently ASLEAP (a tool by josh wright) can crack them via wordlist or rainbow table and JTR can with some coaxing. also the cloudcracker cloud service can for a significant sum of money. what the penetration testing community needs is a tool that can crack MSCHAPV2 efficiently with support for CUDA and OpenCL. Hashcat would fit that knitch perfectly. I also would imagine that using existing crypto libraries it would be fairly easy to add MSCHAPV2 support to hashcat
Posts: 5,185
Threads: 230
Joined: Apr 2010
Adding existing crypto libraries? I take this as an insult.
Posts: 2,301
Threads: 11
Joined: Jul 2010
if it's in hashcat it MUST be faster than without!
Posts: 9
Threads: 3
Joined: Dec 2012
(12-19-2012, 03:08 PM)undeath Wrote: if it's in hashcat it MUST be faster than without!
so then do it with out the point is its a critical crypto scheme that can be cracked but could be done faster with hashcat
Posts: 649
Threads: 18
Joined: Nov 2010
we should change the name to cryptocat while we are at it
Posts: 5,185
Threads: 230
Joined: Apr 2010
Good point
Posts: 5,185
Threads: 230
Joined: Apr 2010
Oh wait, that already exist!