Any tool to BF AES - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: Any tool to BF AES (/thread-5864.html) |
Any tool to BF AES - n0-0ne - 09-11-2016 I know in general AES BF is not feasible. But I found a place that uses really weak passwords (6 chars alpha only). I'm going to see if I can reduce the key space even more. I'm planing to send them a bug report but I want to try and crack one of their cypher text to see how feasible it is. is there a tool that does GPU or even just efficient CPU BF for AES.? I'm currently trying to BF using some node.js code I wrote on my laptop and it should take a month to go over the entire key space. so though feasible with node.js I assume I can find something that will speed things up RE: Any tool to BF AES - atom - 09-12-2016 That makes no sense, AES uses a fixed length key 128, 192 or 256. They can't have only use 6 chars. You sure there's no KDF in between? RE: Any tool to BF AES - n0-0ne - 09-13-2016 Oh sorry I'm sure there is some key derivation from the password to the actual encryption key. I haven't had a chance to figure out what the actual KDF is but the code uses crypto-js AES 256 implementation with default settings (I'll try to dig into the KDF next). I'll looked a bit more into the password generation and the implementation is as follows Math.random().toString(36).substr(2, 6); I originally thought the password can only have letters(upper and lower caps) but that actually a bit weaker (only lower caps and numbers with no upper case). also the I'm not sure about the security of Math.random() I know chrome recently changed there builtin random generation to be a bit more secure, but I assume it's still not cryptographically secure and there might be a way to limit the key space even more but I don't have enough knowledge on how to do it (and the password might have been derived using a differentfrent browser) Any way I guess I'll have to get the KDF first but using crypto-js with node.js I can check ~3 keys in ms (using 4 cores) I thought any better AES implementation might help me increase the rate at least ten times RE: Any tool to BF AES - n0-0ne - 09-13-2016 Ok. So I looked into CryptoJS source and it is basicly an openssl clone in JS. So it seems like one round of md5 with some salt. I tried looping over openssl to brute the password but performance aren't any better. I found a tool for bruteforcing open ssl - https://github.com/glv2/bruteforce-salted-openssl I'll try to see if I can get any better results using it RE: Any tool to BF AES - atom - 09-14-2016 Well, if the KDF and then doing some AES, the correct way to crack it is doing exactly the same. You will crack it in not time with such a password policy. There's even no need to do it on GPU |