Breaking Samsung Android Passwords/PIN
#45
(08-10-2015, 10:53 AM)Diablosss Wrote: HEllo. plese need help. cant get password Sad


password.key contain : 1DF685BD010C9E45995C1542396CEFB7B9D3D632112784C3D2FFC4731E2EF01D482FF3E6

salt is : -1180738009381230676

and i know password is 4 digits

but

E:\cudaHashcat-1.36\cudaHashcat-1.36>cudaHashcat32.exe -a 3 -n 80 -u 1024 -m 580
0  1df685bd010c9e45995c1542396cefb7b9d3d632:ef9d2d094a07a7ac ?d?d?d?d
cudaHashcat v1.36 starting...

Device #1: GeForce GT 630, 4095MB, 1620Mhz, 2MCU
Device #1: WARNING! Kernel exec timeout is not disabled, it might cause you erro
rs of code 702
          You can disable it with a regpatch, see here: http://hashcat.net/wiki
/doku.php?id=timeout_patch

Hashes: 1 hashes; 1 unique digests, 1 unique salts
Bitmaps: 16 bits, 65536 entries, 0x0000ffff mask, 262144 bytes, 5/13 rotates
Applicable Optimizers:
* Zero-Byte
* Single-Hash
* Single-Salt
* Brute-Force
Watchdog: Temperature abort trigger set to 90c
Watchdog: Temperature retain trigger set to 80c
Device #1: Kernel ./kernels/4318/m05800.sm_21.32.ptx
Device #1: Kernel ./kernels/4318/markov_le_v1.32.ptx
Device #1: Kernel ./kernels/4318/amp_a3_v1.32.ptx


ATTENTION!
 The wordlist or mask you are using is too small.
 Therefore, oclHashcat is unable to utilize the full parallelization power of y
our GPU(s).
 The cracking speed will drop.
 Workaround: https://hashcat.net/wiki/doku.php?id=fre...estions#ho
w_to_create_more_work_for_full_speed


INFO: approaching final keyspace, workload adjusted


Session.Name...: cudaHashcat
Status.........: Exhausted
Input.Mode.....: Mask (?d?d?d?d) [4]
Hash.Target....: 1df685bd010c9e45995c1542396cefb7b9d3d632:...
Hash.Type......: Android PIN
Time.Started...: 0 secs
Time.Estimated.: 0 secs
Speed.GPU.#1...:    93962 H/s
Recovered......: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
Progress.......: 10000/10000 (100.00%)
Rejected.......: 0/10000 (0.00%)
HWMon.GPU.#1...:  2% Util, 39c Temp, N/A Fan

Started: Mon Aug 10 13:20:51 2015
Stopped: Mon Aug 10 13:20:54 2015


what can be wrong ?

When calculate with MD5/SALT pass is 9909


Messages In This Thread
RE: Breaking Samsung Android Passwords/PIN - by mobista - 09-11-2015, 10:48 AM