DES with partial plain text
#3
for -m 14000 = DES (PT = $salt, key = $pass)

the "plain text" is the salt and the password is the encryption key

Therefore, with unknown plain text the "hash" would change or you would need to load multiple hashes etc

I would first suggest to verify if what you are doing is even feasible. what is your strategy to crack those hashes ?

how many bytes of the key are known ? is it even feasible to find the correct password (key) ?
This is of course the first question you need to ask yourself, don't get distracted by unknown plain text bytes (at first). If at all they will only make the problem worse (i.e. not knowing A LOT of bytes of the key and also missing some plaintext bytes, that's just very, very bad in terms of feasibility)
Reply


Messages In This Thread
DES with partial plain text - by Davidi74 - 06-14-2020, 09:32 PM
RE: DES with partial plain text - by royce - 06-14-2020, 10:36 PM
RE: DES with partial plain text - by philsmd - 06-14-2020, 11:00 PM
RE: DES with partial plain text - by Davidi74 - 06-15-2020, 02:45 AM
RE: DES with partial plain text - by philsmd - 06-15-2020, 08:39 AM
RE: DES with partial plain text - by Davidi74 - 06-15-2020, 08:58 AM
RE: DES with partial plain text - by philsmd - 06-15-2020, 09:02 AM
RE: DES with partial plain text - by Davidi74 - 06-15-2020, 09:07 AM
RE: DES with partial plain text - by philsmd - 06-15-2020, 09:15 AM
RE: DES with partial plain text - by Davidi74 - 06-15-2020, 09:30 AM
RE: DES with partial plain text - by philsmd - 06-15-2020, 11:54 AM
RE: DES with partial plain text - by Davidi74 - 06-16-2020, 05:04 AM