This is an old revision of the document!


1. Read the manual pages!

How to trace and understand existing code

1. Build debug versions of the package

NOTE: At times, Makefiles and configure scripts need to be passed the debug flag.

2. Run the program under Valgrind’s callgrind tool

valgrind –tool=callgrind openssl dsa -in test.key

3. Use KCachegrind for profile data visualization

Attacking SSH keys

1. Generate test keys

ssh-keygen -t dsa -f test.key openssl dsa -in test.key

2. Use KCachegrind for profile data visualization

Understanding OpenSSL for cracking SSH private keys

See test folder from OpenSSL source distribution.
See demos/maurice folder from OpenSSL source distribution.
See crypto/pem/pem_all.c for usage of PEM_read_bio_PrivateKey() function.
Defined in crypto/pem/pem_pkey.c:EVP_PKEY *PEM_read_bio_PrivateKey()
Also see PEM_read_PrivateKey()
Note: All these functions are high level and seem unsuitable for brute forcing.

Callback Function:

RFC 1421, RFC 1423

openssl pkey openssl pem

Attacking TrueCrypt Volumes

openssl speed -evp aes-256-cbc

Attacking FileVault

RAR (AES 128), ZIP, 7-Zip, PDF, M$ Office, TrueCrypt Volumes,

non_hashes_work.1302567957.txt · Last modified: 2011/04/11 17:25 by dhiru
Except where otherwise noted, content on this wiki is licensed under the following license: CC Attribution-Noncommercial-Share Alike 3.0 Unported
Recent changes RSS feed Donate to DokuWiki Powered by PHP Valid XHTML 1.0 Valid CSS Driven by DokuWiki Powered by OpenVZ Powered by Openwall GNU/*/Linux