Hello all,
I wish to try a brute-force/mask attack to recover a 128 bit aes key.
I have the following:
-*Only* the first half of the target key's sha256.
-A good portion of the target key itself:
CCCC CCCC xxxx xxCC
C=known
x=unknown
I suspect using a half-sha256 might be the biggest issue. But even if the option is not available, it seems like a only minor source code adjustment would be needed to do a half-comparison for sha256. I've looked for the applicable code but can't seem to find it.
Also, here is the command that I'm using (testing with full sha256) just in case there's something can be improved with that too.
hashcat32.exe --force --hex-charset -a 3 -m 1400 hash.txt "3CB8230A0000000000000000?H?H?H?H?H?H?H?H?H?H?H?H7C31" -O
(not getting much GPU acceleration for some reason) - about 6700 kH/s
I suspect I need to use binary chars for the hex input but "0x34 0x86 ..." etc. doesn't work correctly.
I wish to try a brute-force/mask attack to recover a 128 bit aes key.
I have the following:
-*Only* the first half of the target key's sha256.
-A good portion of the target key itself:
CCCC CCCC xxxx xxCC
C=known
x=unknown
I suspect using a half-sha256 might be the biggest issue. But even if the option is not available, it seems like a only minor source code adjustment would be needed to do a half-comparison for sha256. I've looked for the applicable code but can't seem to find it.
Also, here is the command that I'm using (testing with full sha256) just in case there's something can be improved with that too.
hashcat32.exe --force --hex-charset -a 3 -m 1400 hash.txt "3CB8230A0000000000000000?H?H?H?H?H?H?H?H?H?H?H?H7C31" -O
(not getting much GPU acceleration for some reason) - about 6700 kH/s
I suspect I need to use binary chars for the hex input but "0x34 0x86 ..." etc. doesn't work correctly.