/Reed( Kraft-)?Murphy(\.net)?/

the ramblings of a devops engineer and polymath

Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate

Moxie Marlinspike has written up an overview of his and David Hulton’s presentation at Defcon 20 last week: Divide and Conquer: Cracking MS-CHAPv2 with a 100% success rate.

The key takeaways:

  • Reduces the complexity of attacking MS-CHAPv2 to 2^56 (significantly smaller than attempting to brute-force the user’s password)
  • Using FPGA’s, they have achieved “a worst case of ~23 hours … and an average case of about half a day” to crack any given MS-CHAPv2 handshake
  • chapcrack automagically extracts the information needed to crack MS-CHAPv2 handshakes from packet dumps, giving you a “token” to use with the CloudCracker Cracking-as-a-Service platform, opening this attack up to anyone
  • “All users and providers of PPTP VPN solutions should immediately start migrating to a different VPN protocol. PPTP traffic should be considered unencrypted.”

Yikes.

Via /r/netsec.

Reed Kraft-Murphy

Read more posts by this author.