openssl AES256 with a common standardized Password-Based Key Derivation Function
#5
Ok, from my understanding it works that way:

The salt is:

Code:
c6b79fb89bf0d051

hashcat should generate MD5 hashes with the given attack mode, salt it with the above salt and compare it with the first two AES blocks:

Code:
a6a18d9d5b66fa5b7a16e227c46566049c1f272cba153abf17cb329591d4b487

Am i right?

EDIT: i've also found out, that iteration count for this is 3, if this helps.
Reply


Messages In This Thread
RE: openssl AES256 with a common standardized Password-Based Key Derivation Function - by derlange2k - 01-28-2020, 02:59 PM