Breaking Samsung Android Passwords/PIN
#42
This is very easy to crack (and to find out what algo is used), you just need to investigate a little bit and make some tests, see my tests:
Code:
./oclHashcat64.bin --quiet -m 110 7baad69b719fe341bfb23b500abd1bf673070245:e99630554b0b7899 -a 3 4870
7baad69b719fe341bfb23b500abd1bf673070245:e99630554b0b7899:4870

So basically the algo in use here is -m 110 = sha1($pass.$salt)

The same works also with MD5-based hash ( Wink ):

Code:
./oclHashcat64.bin --quiet -m 10 3556ba277abc4b98422e97b18b3f34b1:e99630554b0b7899 -a 3 4870
3556ba277abc4b98422e97b18b3f34b1:e99630554b0b7899:4870

Of course it is preferred to crack MD5, because it should crack must faster.

Hope this helps... btw it is kind of off topic here since this are 2 very different algos (iterated + iteration count within the computation vs non-iterated algo)...
If we want to discuss this in further details, I would suggest that we split this discussion into a new thread.


Messages In This Thread
RE: Breaking Samsung Android Passwords/PIN - by philsmd - 05-27-2015, 11:28 AM