Old Office and KDF - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Old Office and KDF (/thread-7216.html) Pages:
1
2
|
Old Office and KDF - Mem5 - 01-19-2018 Hello, I am trying to crack an old-office hash following the steps given at https://hashcat.net/forum/thread-3665-post-20935.html#pid20935 : Thanks to mode 9710 I found : 'deebd8f416' as output. Quote:Append 4 byte zeros to result-> deebd8f41600000000 Quote:MD5 the 9 bytesmd5("deebd8f41600000000") = CF205B696DC9CB05FB008C2B90BFD2AC Then I'm lost : Quote:Use 16 byte result as 128 bit RC4 Key Could you please provide deeper explanation ? RE: Old Office and KDF - undeath - 01-19-2018 what exact information are you looking for/what is unclear? RE: Old Office and KDF - Mem5 - 01-20-2018 I don't know what to do with the last MD5 I've computed. RE: Old Office and KDF - undeath - 01-20-2018 Are you unclear about how to do RC4 decryption, don't you know what encryptedVerifier is, don't you know what encryptedVerifierHash is, or something else? RE: Old Office and KDF - Mem5 - 01-20-2018 All. I don't see where hashcat can help me to do these steps, so I guess I need to code in python or C++ to deal with RC4 decryption and encryptedVerifier? If yes, are you aware of an existing code that does it? Thanks. RE: Old Office and KDF - atom - 01-23-2018 You need to use 9720 if you collided with 9710 to get the password. Or you just use 9700. Using collider makes sense only if you want to find as many collisions as possible. RE: Old Office and KDF - Mem5 - 01-23-2018 Hum, I'm confused as philsmd wrote: (09-12-2017, 05:00 PM)philsmd Wrote: If you read this carefully https://hashcat.net/forum/thread-3665.html, you will see that you only need -m 9710 to access the data. So.. Do I need 9720 or not ? I just want to access the data, I don't matter having the original password. Thanks. RE: Old Office and KDF - atom - 01-24-2018 Just use -m 9700 then and crack as normal RE: Old Office and KDF - Mem5 - 01-25-2018 (01-24-2018, 11:02 AM)atom Wrote: Just use -m 9700 then and crack as normal Do you mean bruteforce or wordlist attack ? But if the password is more than 30 characters I won't be able to recover it. RE: Old Office and KDF - atom - 01-27-2018 Just use ?a?a?a?a?a?a?a?a?a it will crack one pretty soon. This might not be the correct one, but it will be good enough to open the document. |