Re: How best to crack wrapped-passphrase?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Jan 20, 2014 at 2:34 PM, Artur Rataj <arturrataj@xxxxxxxxx> wrote:
> I guess a better "mutator" would be something more complex, taking
> into account your personal habits of writing passwords, likely
> misspellings like "O" vs "0" if you wrote the characters off the
> screen, swapped pairs etc. If unsuccessful, the program would increase
> the number of mutations (breadth first search).

Yup. Did that.

>
> Also, it might be worth checking if the 0.5 sec delay is not mostly a
> loop for preventing attacks. System load might reveal an idle loop,
> source analysis (profiling?) might reveal a busy loop.

Yup. In the process of doing this now.

>
> Modifying the source of ecryptfs-unwrap-passphrase to directly include
> your code might help too, as you would save on starting a process each
> time.

Yup. This is what I started with. But a trivial update, like hard-code
the known passphrase for the control wrapped-passphrase, fails.
--
To unsubscribe from this list: send the line "unsubscribe ecryptfs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Linux Crypto]     [Device Mapper Crypto]     [LARTC]     [Bugtraq]     [Yosemite Forum]

  Powered by Linux