01-08-2013, 08:42 PM
Hi,
I have 20 DES hashes.
I already recovered 3 of them. I noticed these 3 passwords were created with the same pattern :
8 chars, upper + digits, seem to be random.
I first think about brute-forcing all the charset ?u?d len=8, but this will take 4 days.
Then, I thought about using hcstatgen and statsprocessor with ocl-plus and markov chains to reduce the charset.
But the passwords seem to be randomly created, so is it a good idea ? My dictionnary for this crack is only composed of 3 lines (the 3 recovered passwords).
Do you think the statistics will be good enough ?
If no, any other idea ?
Thanks.
I have 20 DES hashes.
I already recovered 3 of them. I noticed these 3 passwords were created with the same pattern :
8 chars, upper + digits, seem to be random.
I first think about brute-forcing all the charset ?u?d len=8, but this will take 4 days.
Then, I thought about using hcstatgen and statsprocessor with ocl-plus and markov chains to reduce the charset.
But the passwords seem to be randomly created, so is it a good idea ? My dictionnary for this crack is only composed of 3 lines (the 3 recovered passwords).
Do you think the statistics will be good enough ?
If no, any other idea ?
Thanks.