hackmdio codimd Scrypt.kdf hash format
#8
From the above key, it seems pretty clear where to extract N,r,p,salt.

I'm not sure about which bytes to use for the digest portion of the hashcat format however. I've tried:
- the entire key (i.e. all bytes)
- everything after the salt (bytes 49-96)
- the last 32 bytes

To convert from codimd hex bytes, I:
echo <hexbytes> | xxd -r -p | base64

I'm still not able to recover known plain text such as "a", "password", "hashcat" from keys (hashes) generated by codimd.
Reply


Messages In This Thread
RE: hackmdio codimd Scrypt.kdf hash format - by JunkPassword - 08-11-2022, 10:37 PM