[Default] On 6 May 2019 20:10:27 -0700, in bit.listserv.ibm-main
00000047540adefe-dmarc-requ...@listserv.ua.edu (Bill Johnson) wrote:

>In most shops only 2 people have the required access to the RACF database. 
>
Could someone use DF/DSS, DF/HSM, FDR or FDR/ABR to copy the database
and then download the dump of the database?

Clark Morris
>
>Sent from Yahoo Mail for iPhone
>
>
>On Monday, May 6, 2019, 11:06 PM, Bob Bridges <robhbrid...@gmail.com> wrote:
>
>"Once they’d downloaded the RACF database, they subjected it to a 
>password-cracking tool.  John the Ripper is one such tool, widely available on 
>the internet.  On Feb 28, about the same time the RACF database was 
>downloaded, some questions appeared on the mailing list PaulDotCom about 
>hashing methods for RACF; by March 3rd, apparently in response, John the 
>Ripper had been enhanced to include the capability of working on RACF 
>passwords, in collaboration with another tool call CRACF.
>
>"In the Zauf article is this description:  'Creating a password hash algorithm 
>works like this:  After entering the password, it is padded with spaces, if 
>necessary, to a length of 8 bytes.  Each character is then XORed with x‘55’ 
>and shifted left one bit.  Then the user ID is DES-encrypted, using the 
>modified password as the DES key.  Developers took a few days to determine the 
>algorithm and modify John the Ripper.  Now the utility excels at hashing the 
>RACF database.'  It also mentioned a source-code module named racf2john.c, 'a 
>tool that converts database file exported in the input data, read for JTR' 
>[Google’s translation from Polish].
>
>"By way of testing, investigators attempted to use these tools themselves to 
>crack RACF passwords.  They found that a great many passwords could be 
>extracted, that they were easy to discover by dictionary attack, that they 
>were not very complex and in many cases that they’d been unchanged from the 
>default when the ID was created.  Using a standalone PC they cracked about 30 
>000 passwords (out of 120 000 on Applicat’s database) in  'a couple of days'."
>
>---
>Bob Bridges, robhbrid...@gmail.com, cell 336 382-7313
>
>/* If the Earth were flat, cats would have pushed everything off it by now. */
>
>
>-----Original Message-----
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of Charles Mills
>Sent: Monday, May 6, 2019 13:14
>
>I *believe* that was done by investigators after the fact, attempting to 
>determine how the attack might have been done. I don't recall that there is 
>compelling evidence that Svartholm actually did that.
>
>It *is* trivially easy to do, assuming (a.) read access to the DB and (b.) 
>old-style password storage.
>
>-----Original Message-----
>From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On 
>Behalf Of David Spiegel
>Sent: Sunday, May 5, 2019 8:02 AM
>
>One of the tricks he pulled was to offload the RACF Database to a PC and 
>Dictionary Attack it.
>
>----------------------------------------------------------------------
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN
>
>
>
>----------------------------------------------------------------------
>For IBM-MAIN subscribe / signoff / archive access instructions,
>send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to lists...@listserv.ua.edu with the message: INFO IBM-MAIN

Reply via email to