Call: +44 (0)1904 557620 Call

Pete Finnigan's Oracle Security Weblog

This is the weblog for Pete Finnigan. Pete works in the area of Oracle security and he specialises in auditing Oracle databases for security issues. This weblog is aimed squarely at those interested in the security of their Oracle databases.

[Previous entry: "nCipher provides encryption key management for TDE in Oracle 11g"] [Next entry: "Archive and purge in a security context presentation slides available"]

A new improved version of the woraauthbf Oracle password cracker is available

Laszlo Toth has released a new version of his famous Oracle password cracker woraauthbf. This is version 0.22. The main page for the woraauthbf password cracker describes the tool and its use. - (broken link)The latest C source code can be downloaded here and the latest binary compiled version for Windows can be downloaded here.

I will summarise the changes (taken straight from Laszlo's site with no change here):

"The 0.22 has some speed advancement because of the prehash implementation and has some usefull changes:

  • Prehash implementation in the brute-force mode of the password hash.

  • Prehash implementation in the dicitonary mode of the password hash (if the username len > 4)

  • It saves the list of the index of the found passwords, so you can use --prev paramter to leave out the already cracked passwords from a previous session. In the session continue mode (-s), it loads the results automaticly.

  • The order in the permutation engine was changed to follow a more logical way (thanks for Pete Finnigan suggesting it).

  • The permutation engine has more parameters that controls which permutation should be included.

It is strongly recommended to use this new release. The list of some repaired bugs can be found here (thanks Michael Donnerer for reporting them). This is still an early release, so it needs massive bug hunting and code cleaning."

This is a worthwhile release to download and use at least for the speed increases. I have used Laszlo's cracker for quite some time now on professional database audits and always found it a useful tool.

I just did some simple tests comparing version 2.1 and version 2.2 of Laszlo's cracker. The first picture shows version 2.1 running for a single password using brute force. I ran the cracker for around 3 minutes to let it speed up and show a reasonable average:

Running Woraauthbf Version 0.21

I then ran the new woraauthbf cracker, version 2.2 and did exactly the same test:

Running Woraauthbf Version 0.22

The results are as expected and much faster than the earlier version. We see an increase in speed from 1.15 Million hashes a second to 1.4 million hashes a second. This is a 22.45% speed increase on my laptop. Quite impressive Laszlo!

The speed increase will not be as impressive for dictionary attacks as the word order cannot be guarenteed in a dictionary file to take full effect of the pre-hashing implemented by Laszlo.