Unless you're developing or debugging JtR program code, you're probably looking for the sample non-hashes page instead of this one.
1. Read the manual pages!
1. Build debug versions of the package
https://wiki.archlinux.org/index.php/Debug_-_Getting_Traces
NOTE: At times, Makefiles and configure scripts need to be passed the debug flag.
2. Run the program under Valgrind’s callgrind tool
valgrind –tool=callgrind openssl dsa -in test.key
3. Use KCachegrind for profile data visualization
Attacking SSH keys
TODO:
1. Attack PKCS#8 keys, change iteration count and use aes256 (ssh-cracker) 2. Making SSH keys harder to brute-force.
HOWTO:
1. Generate test keys
ssh-keygen -t dsa -f test.key openssl dsa -in test.key
2. Use KCachegrind for profile data visualization
http://dl.dropbox.com/u/1522424/Callgrind-OpenSSL-DSA-decrypt-path.png
http://dl.dropbox.com/u/1522424/Callgrind-JtR-DES-path.png
Understanding OpenSSL for cracking SSH private keys
See test folder from OpenSSL source distribution.
See demos/maurice folder from OpenSSL source distribution.
See crypto/pem/pem_all.c for usage of PEM_read_bio_PrivateKey() function.
Defined in crypto/pem/pem_pkey.c:EVP_PKEY *PEM_read_bio_PrivateKey()
Also see PEM_read_PrivateKey()
Note: All these functions are high level and seem unsuitable for brute forcing.
Callback Function: http://www.openssl.org/docs/crypto/pem.html
http://www.openssl.org/docs/crypto/OpenSSL_add_all_algorithms.html
http://www.openssl.org/docs/crypto/bio.html
http://www.openssl.org/docs/crypto/BIO_s_file.html
http://www.openssl.org/docs/crypto/pem.html
http://www.openssl.org/docs/crypto/pem.html#PEM_ENCRYPTION_FORMAT
http://www.openssl.org/docs/apps/rsa.html
http://www.openssl.org/docs/crypto/pem.html
http://www.jensign.com/opensslkey/
RFC 1421, RFC 1423
openssl pkey openssl pem
Attacking TrueCrypt Volumes
openssl speed -evp aes-256-cbc
http://keepass.info/help/base/security.html
Attacking FileVault
http://crypto.nsa.org/vilefault/
Arch Linux OpenCL support
pacman -S opencl-header nvidia nvidia-utils # NVIDIA systems
cower -sd catalyst catalyst-utils # ATI systems
Attacking ZIP files
<WIP>
More Formats: RAR (AES 128), Putty ppk files, 7-Zip, PDF, M$ Office, TrueCrypt Volumes …