04-12-2013, 08:16 AM
Hey everybody good day , since I could not wait for a new version to come! . I dug myself in the android world and found that the algorithm just adds the two hashes in the "/data/system/password.key" file, like so the (SHA1 + MD5); so as in the OP bkerler is using the SHA1 part only(the 40 digit long part of the string), we could use the same command to break the password/PIN using the MD5 value to get the same value.
So we could do a:
"./cudaHashcat-plus64 -a 3 -n 80 -u 1024 -m 10 3bf54dbf16c58965f93bf164a6612c38:636bb8161c861503 ?d?d?d?d"
Using the MD5 part of the string, the 32 digits long.
To brute force it.
Any feedback welcome
PD: OH and I'm using my own string of the password.key file
here it is:
So we could do a:
"./cudaHashcat-plus64 -a 3 -n 80 -u 1024 -m 10 3bf54dbf16c58965f93bf164a6612c38:636bb8161c861503 ?d?d?d?d"
Using the MD5 part of the string, the 32 digits long.
To brute force it.
Any feedback welcome
PD: OH and I'm using my own string of the password.key file
here it is:
Code:
21faa15e0409fa961f0c2b2e8e2fde96cfe4a9e53bf54dbf16c58965f93bf164a6612c38