[prev in list] [next in list] [prev in thread] [next in thread]
List: secprog
Subject: Re: Precomputed Dictionary Attacks (was Re: Preventing Dictionary
From: Alec Muffett <alecm () COYOTE ! UK ! SUN ! COM>
Date: 2001-04-12 12:35:25
[Download RAW message or body]
>L. Adrian Griffis wrote:
>>Also, is there evidence now that precomputed
>>dictionary attacks have been seen in the wild?
>
>Well, the post-computed equivalent has been in the wild for a long time.
>Crack sorts the /etc/passwd file by salt, and if two user's password entries
>have the same salt, it can check both at the same time (two-for-one).
which leads us neatly back to the too-few-salts/too-short-a-salt-string
-is-bad hypothesis, which was neatly explained a few days ago in this thread,
and which is why i have not seen fit to chip-in to the discussion.
as has also been pointed out before, partial all-precomputed crackers have
been in the wild for a long time - qcrack - and no doubt others exist.
- alec
--
[opinions and statements cited herein are personal and may not be factual]
alec muffett - random numbers: 43651 92 - alec.muffett @ uk.sun.com
perl -nle 'setpwent;crypt($_,$c)eq$c&&print"$u=$_"while($u,$c)=getpwent'
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic