08-11-2022, 10:37 PM
From the above key, it seems pretty clear where to extract N,r,p,salt.
I'm not sure about which bytes to use for the digest portion of the hashcat format however. I've tried:
- the entire key (i.e. all bytes)
- everything after the salt (bytes 49-96)
- the last 32 bytes
To convert from codimd hex bytes, I:
echo <hexbytes> | xxd -r -p | base64
I'm still not able to recover known plain text such as "a", "password", "hashcat" from keys (hashes) generated by codimd.
I'm not sure about which bytes to use for the digest portion of the hashcat format however. I've tried:
- the entire key (i.e. all bytes)
- everything after the salt (bytes 49-96)
- the last 32 bytes
To convert from codimd hex bytes, I:
echo <hexbytes> | xxd -r -p | base64
I'm still not able to recover known plain text such as "a", "password", "hashcat" from keys (hashes) generated by codimd.