Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...
Who thought that "PBKDF2_SHA1(pw, salt, 1000, 256)" is a good idea?
Because CPU hash crackers are going to:
* Checking the first 160 bits gets you 2x faster than defender.
* SSE2 gets you 4x faster... |
|
Sc00bz |
Feature Requests
|
6 |
30,198 |
11-15-2012, 06:20 AM |
|
|
Thread: Saving calculated hashes
Post: RE: Saving calculated hashes
You need to write a program that will hash using SSE2/SSSE3/AVX to make it fast. You should write truncated binary hashes to the file. Since I guess you want to make it useful, you should make a lossy... |
|
Sc00bz |
General Talk
|
8 |
16,786 |
05-19-2013, 10:38 PM |
|
|
Thread: PHD hashrunner 2013
Post: RE: PHD hashrunner 2013
I think I saw this somewhere, but I love the idea. Everyone submits a password list/generation info for 1M, 1G, 1T, 1P, or whatever. Then when a major password breach happens you test those passwords ... |
|
Sc00bz |
Organisation and Events
|
16 |
39,382 |
05-27-2013, 02:13 PM |
|
|
Thread: Openwall cracker ?!
Post: RE: Openwall cracker ?!
The "full" keyspace is 69^7 so 1.5 hours vs 24 minutes.
Unless you add in foreign characters. These change depending on the system's code page. I tried to figure out the mapping and failed because ... |
|
Sc00bz |
Old oclHashcat Support
|
4 |
11,020 |
01-28-2014, 10:43 PM |
|
|
Thread: Lastpass cracking speed
Post: RE: Lastpass cracking speed
pragmatic Wrote: (06-16-2015, 02:12 AM)
--
I saw reports from our own epixoip that the cracking speed for this set up would be < 10 H/s even on the TitanX, however i'm seeing different numbers so I w... |
|
Sc00bz |
General Talk
|
6 |
17,869 |
06-16-2015, 02:29 AM |
|
|
Thread: Huge wordlist
Post: RE: Huge wordlist
Without knowing what you are doing, I'd suggest removing the last character from all the words in the word list. Sort and remove duplicates. Then do a hybrid attack to add the last character back in. ... |
|
Sc00bz |
Very old oclHashcat-lite Support
|
9 |
25,446 |
09-10-2013, 01:17 AM |
|
|
Thread: Help to recover password from an unknown hash type
Post: RE: Help to recover password from an unknown hash ...
Azren, I think epixoip missed this line:
Code:
--
$key = trim($username).trim($cleartext_password);
--
This is a very weird construction it's encrypting the password with the password. You can thi... |
|
Sc00bz |
General Help
|
11 |
21,803 |
01-06-2015, 09:49 AM |
|
|
Thread: Help to recover password from an unknown hash type
Post: RE: Help to recover password from an unknown hash ...
Lame I was hoping this would be 16 but it's 32:
Code:
--
echo mcrypt_get_key_size('twofish', 'cfb');
--
So the key is the MD5 of the username and password (the key is in hex).
I'm just going to... |
|
Sc00bz |
General Help
|
11 |
21,803 |
01-06-2015, 10:35 AM |
|
|
Thread: Haswell bench
Post: RE: Haswell bench
kartan Wrote: (06-25-2013, 03:45 AM)
--
First bench in bruteforce -a 3 -m 0 gives about 96-100M on my 4770k @4,4GHz.
I do more benchmarks tomorrow.
--
Hey can you run this and tell me what the speed... |
|
Sc00bz |
Hardware
|
6 |
11,936 |
06-26-2013, 12:53 PM |
|
|
Thread: Haswell bench
Post: RE: Haswell bench
Man and I was hoping for a nice speed increase. If you compare the speed to Hashcat it'll probably be on par (hashcat -m 3200 -n 1 -a 3 bcrypt.txt ?a?a?a?a?a). Hashcat might be faster since I just rea... |
|
Sc00bz |
Hardware
|
6 |
11,936 |
06-26-2013, 04:59 PM |
|
|
Thread: Android Full Disk Encryption
Post: RE: Android Full Disk Encryption
If you decrypt the second AES block in the superblock, then you can test the following which gets you around 1 in 2 ^ 92.3:
Code:
--
Offset (bytes) | Size (bytes) | Description
---------------+----... |
|
Sc00bz |
User Contributions
|
13 |
55,410 |
04-28-2013, 09:24 PM |
|
|
Thread: 3Des - ECB brute forcing
Post: RE: 3Des - ECB brute forcing
Well we know the ciphertext of 12345678, password, and adobe123. So that's enough needed. Also you wouldn't brute force this you would take all 2^56 keys and encrypt one of the plaintext blocks. Stori... |
|
Sc00bz |
Very old oclHashcat-plus Support
|
10 |
40,323 |
11-12-2013, 02:10 AM |