Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: 3DES Known Plaintext - How?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hi,
I've a 3DES ECB block and know the plaintext, can you help me on the hashcat syntax?

I'm trying:
Code:
./hashcat -m 14100 -a 3 0123456789abcdef:1234567 "?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a"

while "0123456789abcdef" represents the cipher text and 1234567 represents the known plaintext.

I just receive "Hash '0123456789abcdef:1234567': Token length exception"...

The documentation to 3DES says:
Code:
  14100 | 3DES (PT = $salt, key = $pass)                  | Raw Cipher, Known-Plaintext attack

but i have no idea how to use that.
Separate from your syntax issue ... have you done the math of how long it would take to exhaust this mask (if it were even possible to run it with hashcat)?

https://www.wolframalpha.com/input/?i=95%5E24
(02-10-2020, 03:19 AM)clemoo Wrote: [ -> ]Hi,
I've a 3DES ECB block and know the plaintext, can you help me on the hashcat syntax?

I'm trying:
Code:
./hashcat -m 14100 -a 3 0123456789abcdef:1234567 "?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a?a"

while "0123456789abcdef" represents the cipher text and 1234567 represents the known plaintext.

I just receive "Hash '0123456789abcdef:1234567': Token length exception"...

The documentation to 3DES says:
Code:
  14100 | 3DES (PT = $salt, key = $pass)                  | Raw Cipher, Known-Plaintext attack

but i have no idea how to use that.


figured it out, the plaintext "1234567" should have been hex-bytes aswell.

For those are interested: the keyspace is far to large - so the mask doesn't work
(02-10-2020, 03:30 AM)royce Wrote: [ -> ]Separate from your syntax issue ... have you done the math of how long it would take to exhaust this mask (if it were even possible to run it with hashcat)?

https://www.wolframalpha.com/input/?i=95%5E24
hi,
no it is not possible with hashcat...

I'm still hoping to find it in my wordlist...

and yes i know it would take me with all the resources i've access to 10³¹ years to search the keyspace completly.