And hereby I also present my open source, SSE2 optimized, NTLM password brute forcer, called EnTibr. This is almost the same code as the one used in EmDebr. I also used reversing of the MD4 algorithm, skipping the full 3rd round. With my own system I get around 150 Mhashes/s using 4 cores @ 3.2Ghz.
Again, I hope this helps others to understand reversing and maybe you can use my code to write a better/faster open source cracker. Feel free to leave a comment or to post some improvements!
The download links:
EnTibr_0.1_win32.zip
EnTibr_0.1_src.zip
You might also need to install the Microsoft Visual C++ 2008 Redistributable Package.
Sunday, May 3, 2009
Subscribe to:
Post Comments (Atom)
I'm impressed, great work Daniel!
ReplyDeleteThis is great and handy as I haven't the time or bandwidth to download a rainbow table. Thank you :)
ReplyDeleteI've love to see what this thing would do on a PS3! Thanks for all your hard work and thanks for sharing!
ReplyDeleteHi Cliffy, tnx for your comment!
ReplyDeleteI might adapt Psebr-md5 and make an Psebr-ntlm some time... feel free to try it yourself anytime soon, as all the code is available already :)
I've taken a look at the code to see about porting it to Mac OS X, but you are light years beyond me in coding ability.
ReplyDeleteBut I've got nothing to lose, so I'll give it a try.
Hi Daniel,
ReplyDeleteif you want to fight with a real challenge try to develop a software for Kerberos 5 Pre Authentication (Windows):
http://www.cerberusgate.com/benchmark_comparison.htm
Your ability could invent something smart!
:)
jack
Hello,
ReplyDeleteAny plan to make a GPU version?
How do I tell it to use non-ascii too?
ReplyDelete