THC-FuzzyFingerprint 0.0.8 review

Download
by rbytes.net on

Welcome to the world of Fuzzy Fingerprinting, a new technique to attack cryptographic key authentication protocols that rely on human

License: GPL (GNU General Public License)
File size: 196K
Developer: The Hacker's Choice
0 stars award from rbytes.net

Welcome to the world of Fuzzy Fingerprinting, a new technique to attack cryptographic key authentication protocols that rely on human verification of key fingerprints. It is important to note that while fuzzy fingerprinting is an attack against a protocol, it is not a cryptographic attack and thus does not attack any cryptographic algorithm.

THC-FuzzyFingerprint tool generates fuzzy fingerprints as described in the corresponding paper. It is an ideal extension to man-in-the-middle attacks against the SSH service. The current version supports RSA and DSA key generation and MD5 and SHA1 fingerprints.

The Challenge:

THC is doing a little "seti@home" like competition. The challenge is to generate the best fuzzy fingerprint for our target public SSH host key. Here are some information on our victim's SSH public host key.

The victim host: kimble.org
Public SSH key: kimble.org.pub
Public key algorithm: RSA
Public key length: 1024
MD5 key fingerprint: 08:54:5d:27:f8:e9:47:4e:49:8a:87:7e:03:cc:98:73

Download the fuzzy fingerprint release from the link at the top of this page and join the competition. Compile ffp and launch the tool against the victim host's fingerprint and key algorithm using the following setup. (It is essential that you provide all of the given arguments to ffp so that we are able to compare different people's fuzzy fingerprints)

$ ffp -f md5 -k rsa -b 1024
-t 08:54:5d:27:f8:e9:47:4e:49:8a:87:7e:03:cc:98:73
-s /var/tmp/kimble.org.state

You can stop the process at any point and continue later by just using the following comman line options.

$ ffp -s /var/tmp/kimble.org.state

THC-FuzzyFingerprint 0.0.8 search tags