hashcat Forum
Using multiple dictionary for IPv6? - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Support (https://hashcat.net/forum/forum-3.html)
+--- Forum: hashcat (https://hashcat.net/forum/forum-45.html)
+--- Thread: Using multiple dictionary for IPv6? (/thread-5669.html)



Using multiple dictionary for IPv6? - cudaHashMD5 - 07-19-2016

Hi, all. New to the forum.

I was wondering if there were a way of using something like Philips321 did to crack MD5 hashes of IPv4 IP addresses, but use it for IPv6?

Here's what he did. He used two word lists, each comprising half of a complete IPv4 IP address, cracking the MD5 in ~4 seconds:
https://www.phillips321.co.uk/2012/04/04/cracking-an-md5-of-an-ip-address/

How would I go about doing the same for IPv6? Can I use just one word list, comprising the full 65536 entries-per-octet, and do that 8 times, with a ":" separator between each octet, and increment from a minimum of 2 to a maximum of 40?

What about 'IPv6 with IPv4 tunneling' addresses, in the form:
0000:0000:0000:0000:0000:0000:255.255.255.255

That's an awfully long string to try to brute force, I'm only doing 382.2 MH/s. Is there a quicker way than brute-forcing the MD5 hash?


RE: Using multiple dictionary for IPv6? - atom - 07-19-2016

IPv6 has a keyspace of 128 bits, you can't BF it.


RE: Using multiple dictionary for IPv6? - cudaHashMD5 - 07-20-2016

Hi, Atom.

Yeah, IPv6 seems to be far too long for any one person to crack. I found a distributed cracker, but it'd take a few tens of thousands of people all working on the same MD5 to crack it, I think.