I have a 'black box' which seems to do some form of ECB - any string file results in blocks of 8byte and blocks are the same for any same text. I am of course not sure which encryption is used, but DES-ECB seems a good guess.
I am currently using
but that seems to take 15yrs on AWS GPU server :/
I am pretty sure that the above line should try all 8 byte combinations as the password. Also, my input file is in format "encoded_hex:original_text", that is also correct I hope?
I can generate any number of input/output pairs in order to help in cracking. Is it possible to use this fact to improve/optimize the cracking process?
I am currently using
Code:
./hashcat -a 3 -m 14000 bla.hash -1 charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1
I am pretty sure that the above line should try all 8 byte combinations as the password. Also, my input file is in format "encoded_hex:original_text", that is also correct I hope?
I can generate any number of input/output pairs in order to help in cracking. Is it possible to use this fact to improve/optimize the cracking process?