Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
An ethpresale tool on github says this: https://github.com/kholia/ethpresale/blob/master/pyethtool/pyethtool.py
Quote:
--
if not seed:
seed = random_key().decode('hex') # uses pybitcointools'... |
|
uprising_bike |
hashcat
|
10 |
23,906 |
06-30-2018, 02:15 AM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
philsmd Wrote: (06-29-2018, 05:46 PM)
--
hashcat uses ?H for 0123456789ABCDEF
...
the main problem now is that the hash mode -m 5000 only supports a password length of 55 bytes.
...
--
This must be ... |
|
uprising_bike |
hashcat
|
10 |
23,906 |
06-29-2018, 06:08 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
phil: Sorry. I was being silly. I meant hex characters between 0 and F not full bytes, so (2^4)^5 =1048576. These could be at any one of C(64, 5) = 7624512, so a space of approximately 8*10^12.
I ... |
|
uprising_bike |
hashcat
|
10 |
23,906 |
06-29-2018, 05:35 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: Cracking partial hex seed for Ethreum Presale
Hello and thank you to any prospective helpers. Apologies if this is obvious, but I may have missed something in the mask documentation or have been looking in the wrong place.
I have been unable ... |
|
uprising_bike |
hashcat
|
10 |
23,906 |
06-29-2018, 04:23 PM |