Penetration Testing mailing list archives
Re: Blowfish cracker
From: Karyn Pichnarczyk <karyn () sandstorm net>
Date: Thu, 06 Jul 2006 14:42:52 -0400
You didn't mention what system these passwords were on, or what application they were in. The cracking tool would depend upon that. I don't know of any blowfish decrypters, but there's always the bruteforce method. Here's a quote by Bruce Schneier about cracking Blowfish: http://www.schneier.com/blog/archives/2005/04/blowfish_on_24.html For cracking tools, google on these terms: "bruteforce" "cracking" "password". You'll get hits. Select the one that delights you the most. karyn donald.mccoy () gmail com wrote:
I got tasked with trying to crack a couple of blowfish encrypted passwords and I now need a cracker. I know that this is pretty impossible but my boss wants a demonstration on how long it would take to crack this. Could someone suggest a good cracker?------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.------------------------------------------------------------------------------
-- Karyn Pichnarczyk Sandstorm Enterprises, Inc. ______________________________________________________________ Be advised that all electronic communication with Sandstorm Enterprises(R) is subject to monitoring by NetIntercept(R), our full-content network forensics analysis tool. More information about NetIntercept can be found at www.sandstorm.net. Please direct any questions to privacy () sandstorm net. ______________________________________________________________ ------------------------------------------------------------------------------ This List Sponsored by: CenzicConcerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------
Current thread:
- Blowfish cracker donald . mccoy (Jul 06)
- Re: Blowfish cracker Karyn Pichnarczyk (Jul 06)
- RE: Blowfish cracker Patrick (Jul 17)
- <Possible follow-ups>
- RE: Blowfish cracker Levenglick, Jeff (Jul 06)
- RE: Blowfish cracker Levenglick, Jeff (Jul 06)
- RE: Blowfish cracker Graves, Jamie (Jul 17)