Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Blowfish cracker
From: Karyn Pichnarczyk <karyn () sandstorm net>
Date: Thu, 06 Jul 2006 14:42:52 -0400

You didn't mention what system these passwords were on, or what
application they were in.  The cracking tool would depend upon
that. I don't know of any blowfish decrypters, but there's
always the bruteforce method.

Here's a quote by Bruce Schneier about cracking Blowfish:

http://www.schneier.com/blog/archives/2005/04/blowfish_on_24.html

For cracking tools, google on these terms: "bruteforce" "cracking" "password".
You'll get hits.  Select the one that delights you the most.

karyn

donald.mccoy () gmail com wrote:

I got tasked with trying to crack a couple of blowfish encrypted passwords and I now need a cracker. I know that this is pretty impossible but my boss wants a demonstration on how long it would take to crack this. Could someone suggest a good cracker?
------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------



--

Karyn Pichnarczyk
Sandstorm Enterprises, Inc.
______________________________________________________________

Be advised that all electronic communication with Sandstorm
Enterprises(R) is subject to monitoring by NetIntercept(R), our
full-content network forensics analysis tool. More information
about NetIntercept can be found at www.sandstorm.net. Please
direct any questions to privacy () sandstorm net ______________________________________________________________




------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? Why not go with the #1 solution - Cenzic, the only one to win the Analyst's Choice Award from eWeek. As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/news_events/wpappsec.php And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com for details.
------------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault