{"title":"通过RC4-HMAC加密类型分析提取Kerberos密码","authors":"Ahmed Alazzawe, A. Nawaz, D. Wijesekera","doi":"10.1109/AICCSA.2008.4493602","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a system and method for obtaining Kerberos passwords by capturing a single packet, encrypted using the RC4-HMAC encryption type. We present two methods that when combined together, can reduce the time needed to crack a password by 60.2% over brute force. The first method uses known text in the preauthentication phase to skip the verification section of the decryption process. The second method precomputes some of the steps of the RC4-HMAC decryption process. We also present a novel method of eliminating the amount of space needed to store passwords in memory by using a counter to map hashes to their password.","PeriodicalId":234556,"journal":{"name":"2008 IEEE/ACS International Conference on Computer Systems and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Extracting Kerberos passwords through RC4-HMAC encryption type analysis\",\"authors\":\"Ahmed Alazzawe, A. Nawaz, D. Wijesekera\",\"doi\":\"10.1109/AICCSA.2008.4493602\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a system and method for obtaining Kerberos passwords by capturing a single packet, encrypted using the RC4-HMAC encryption type. We present two methods that when combined together, can reduce the time needed to crack a password by 60.2% over brute force. The first method uses known text in the preauthentication phase to skip the verification section of the decryption process. The second method precomputes some of the steps of the RC4-HMAC decryption process. We also present a novel method of eliminating the amount of space needed to store passwords in memory by using a counter to map hashes to their password.\",\"PeriodicalId\":234556,\"journal\":{\"name\":\"2008 IEEE/ACS International Conference on Computer Systems and Applications\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE/ACS International Conference on Computer Systems and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AICCSA.2008.4493602\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE/ACS International Conference on Computer Systems and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AICCSA.2008.4493602","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Extracting Kerberos passwords through RC4-HMAC encryption type analysis
In this paper, we propose a system and method for obtaining Kerberos passwords by capturing a single packet, encrypted using the RC4-HMAC encryption type. We present two methods that when combined together, can reduce the time needed to crack a password by 60.2% over brute force. The first method uses known text in the preauthentication phase to skip the verification section of the decryption process. The second method precomputes some of the steps of the RC4-HMAC decryption process. We also present a novel method of eliminating the amount of space needed to store passwords in memory by using a counter to map hashes to their password.