Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7675

DES-ECB & optimization

$
0
0
I have a 'black box' which seems to do some form of ECB - any string file results in blocks of 8byte and blocks are the same for any same text. I am of course not sure which encryption is used, but DES-ECB seems a good guess.


I am currently using
Code:
./hashcat  -a 3 -m 14000 bla.hash -1 charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1
but that seems to take 15yrs on AWS GPU server :/

I am pretty sure that the above line should try all 8 byte combinations as the password. Also, my input file is in format "encoded_hex:original_text", that is also correct I hope?

I can generate any number of input/output pairs in order to help in cracking. Is it possible to use this fact to improve/optimize the cracking process?

Viewing all articles
Browse latest Browse all 7675

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>