Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: AMD Radeon R9 290X
Post: RE: AMD Radeon R9 290X
Is there some information on that GCN2 architecture? |
|
gat3way |
Hardware
|
30 |
61,917 |
09-27-2013, 09:54 AM |
|
|
Thread: cant convert CAP to HCCAP
Post: RE: cant convert CAP to HCCAP
Extracting handshake from pcap dumps is a tricky process. Technically speaking, just 2 out of the 4 frames - 2) and 3) - are enough to get the needed data (packet 3) should have by specification the A... |
|
gat3way |
General Help
|
1 |
7,111 |
07-25-2013, 05:08 PM |
|
|
Thread: Android Full Disk Encryption
Post: Android Full Disk Encryption
I was recently contacted by a person who at that point prefers to remain undisclosed and who provided me sample android encrypted disk images with the passwords to them.
I was able to identify the sc... |
|
gat3way |
User Contributions
|
13 |
55,418 |
04-28-2013, 07:17 PM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
You mean having 4 tables rather than one plus rotates?
In the APP SDK sample, they do it precisely as it is described in the papers.
However, you can combine SubBytes,ShiftRows and MixColumns into a... |
|
gat3way |
Very old oclHashcat-plus Support
|
44 |
362,065 |
04-18-2013, 05:02 PM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
atom, you are doing the AES decryption on GPU? I guess you are using the table-based approach (such as what OpenSSL does and not what the AES sample from AMD APP SDK does). Do you store the expanded k... |
|
gat3way |
Very old oclHashcat-plus Support
|
44 |
362,065 |
04-17-2013, 11:27 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
WOW :)
Well someone can write a script that generates rules based on that file, would be rather useful :) |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-12-2013, 12:05 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
This looks fun. I don't know what exactly it is used for though. Hopefully that's not about the device password :) |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-12-2013, 11:59 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
The "encrypt phone" feature is based on dmcrypt/LUKS and it is (usually) much more secure as compared to Samsung's algo. I say "usually" because key derivation iterations depend on the hardware the en... |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-12-2013, 10:22 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Yes, salted SHA1/MD5 is generic, iterated sha1 is apparently Samsung-specific. Yes, it makes no sense to attack sha1 if you can attack md5. BTW you would be surprised how weak the pattern lock is, it ... |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-12-2013, 09:37 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
The same works for Nexus 7, but there is a difference, the lockscreen.password_salt is not located in /data/data/com.android.providers.settings/databases/settings.db, but rather in /data/system/lockse... |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-07-2013, 12:37 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
That would work in case you have the phone unlocked (in the sense of PIN already entered and not related to bootloader). Still if it is locked, you shouldn't be able to upload anything via adb. I gues... |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-04-2013, 01:03 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Hm, how do you practically extract that? I am trying to extract it from Samsung Galaxy S3. Of course /data/data and /data/system are not readable by the adb user and it would require to root the phone... |
|
gat3way |
User Contributions
|
47 |
208,554 |
04-04-2013, 12:22 PM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
hashkill does it (as far as the current git tree is concerned). It's not quite useful though - unless you know something about the password and/or the algos used. Whirlpool turned out to be a disaster... |
|
gat3way |
Feature Requests
|
9 |
27,826 |
01-31-2013, 01:10 PM |
|
|
Thread: BCrypt + GTX670 = 6 c/s?
Post: RE: BCrypt + GTX670 = 6 c/s?
wflme Wrote: (01-16-2013, 06:49 PM)
--
blandyuk Wrote: (01-16-2013, 05:31 PM)
--
Look at the speeds for bcrypt on https://hashcat.net/oclhashcat-plus/ under "Performance". A Radeon 7970 gets 4020 c/s... |
|
gat3way |
Very old oclHashcat-plus Support
|
23 |
52,580 |
01-16-2013, 08:06 PM |
|
|
Thread: Good budget GPU ?
Post: RE: Good budget GPU ?
7970 is the best GPU hardware for cracking purposes. Well....except for sha512/whirlpool-related stuff. For those cases, nvidia could even turn out to be faster. But then, it's not as much energy-effi... |
|
gat3way |
Hardware
|
9 |
32,527 |
01-05-2013, 01:35 AM |
|
|
Thread: SL3, they did it again
Post: RE: SL3, they did it again
Good luck using -m 100 for sl3 :)
Great you showed your true face also mr humble contributor - a good example of the sl3 horde mentality :) |
|
gat3way |
Very old oclHashcat-lite Support
|
71 |
191,556 |
01-02-2013, 10:34 PM |
|
|
Thread: SL3, they did it again
Post: RE: SL3, they did it again
No, you are basically fucked up, stuck at 2012. Since no new hardware will be supported, you would just pray your GPUs don't die, cause newer hardware just wouldn't work. 8xxx is going out soon, but h... |
|
gat3way |
Very old oclHashcat-lite Support
|
71 |
191,556 |
01-02-2013, 10:25 PM |
|
|
Thread: SL3, they did it again
Post: RE: SL3, they did it again
Over the time I've been involved in coding both bitcoin mining software and partially sl3 unlocking one. I found out those two communities (are/have become) utterly disrespectful, driven by pure greed... |
|
gat3way |
Very old oclHashcat-lite Support
|
71 |
191,556 |
01-02-2013, 09:50 PM |
|
|
Thread: time estimate for brute forcing wpa2
Post: RE: time estimate for brute forcing wpa2
I am afraid humans will be already extinct long before it processes the whole keyspace. |
|
gat3way |
Very old oclHashcat-plus Support
|
5 |
12,300 |
12-12-2012, 09:02 PM |
|
|
Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy
Can't you just use gpg to encrypt it and then share your public key with the ones that need to decrypt it? |
|
gat3way |
Feature Requests
|
8 |
16,482 |
12-09-2012, 11:27 PM |