Auditing an Oracle database for security issues is very important. PeteFinnigan.com provides all of the information and tools that you will need Click here for details of PeteFinnigan.com Limited's detailed Oracle database security audit service Click here for details of PeteFinnigan.com Limited's Oracle Security Training Courses
There are 57 visitors online    
Cookie Policy:We only use essential cookies on small sections of this website. For details see here.

Pete Finnigan's Oracle security weblog


Home » Archives » July 2008 » A new improved version of the woraauthbf Oracle password cracker is available

[Previous entry: "nCipher provides encryption key management for TDE in Oracle 11g"] [Next entry: "Archive and purge in a security context presentation slides available"]

A new improved version of the woraauthbf Oracle password cracker is available

July 14th, 2008 by Pete


Laszlo Toth has released a new version of his famous Oracle password cracker woraauthbf. This is version 0.22. The main page for the woraauthbf password cracker describes the tool and its use. The latest C source code can be downloaded here and the latest binary compiled version for Windows can be downloaded here.

I will summarise the changes (taken straight from Laszlo's site with no change here):

"The 0.22 has some speed advancement because of the prehash implementation and has some usefull changes:

  • Prehash implementation in the brute-force mode of the password hash.

  • Prehash implementation in the dicitonary mode of the password hash (if the username len > 4)

  • It saves the list of the index of the found passwords, so you can use --prev paramter to leave out the already cracked passwords from a previous session. In the session continue mode (-s), it loads the results automaticly.

  • The order in the permutation engine was changed to follow a more logical way (thanks for Pete Finnigan suggesting it).

  • The permutation engine has more parameters that controls which permutation should be included.


It is strongly recommended to use this new release. The list of some repaired bugs can be found here (thanks Michael Donnerer for reporting them). This is still an early release, so it needs massive bug hunting and code cleaning."


This is a worthwhile release to download and use at least for the speed increases. I have used Laszlo's cracker for quite some time now on professional database audits and always found it a useful tool.

I just did some simple tests comparing version 2.1 and version 2.2 of Laszlo's cracker. The first picture shows version 2.1 running for a single password using brute force. I ran the cracker for around 3 minutes to let it speed up and show a reasonable average:



Running Woraauthbf Version 0.21



I then ran the new woraauthbf cracker, version 2.2 and did exactly the same test:



Running Woraauthbf Version 0.22



The results are as expected and much faster than the earlier version. We see an increase in speed from 1.15 Million hashes a second to 1.4 million hashes a second. This is a 22.45% speed increase on my laptop. Quite impressive Laszlo!

The speed increase will not be as impressive for dictionary attacks as the word order cannot be guarenteed in a dictionary file to take full effect of the pre-hashing implemented by Laszlo.

July 2008
SMTWTFS
  12345
6789101112
13141516171819
20212223242526
2728293031  

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

Weblog Home
Weblog Archives


Home
Oracle Security Tools page
Oracle security papers
Oracle Security alerts

Web Development
SQL Server Security

RSS 1.0 FEED
RSS 2.0 FEED
Atom 0.3 FEED
Powered by gm-rss 2.0.0


Valid XHTML 1.0!