Breaking SHA1-HMAC
#9
(08-01-2013, 12:17 AM)feedworks Wrote: From One of the earlier replies - "In this case a mask of ?l?l?l?l should crack it."

Where will I put that mask? Will it be part of dict.txt in our example?

Thanks,
Satish

In the command you posted, replace outfile with ?l?l?l?l.

edit: understand that -a 3 is a mask attack. -a 0 is a dictionary attack.

Quote:Satish and I are working together on a school project - I have a quick question what if it is a truncated hash. Instead of having the full hash we know the message and the truncated hash - say we know abcd as the message and lets say we are limited in the hash length so only 8717 is available as the hash value. Would that improve the performance of hashcat in possibly finding collisions and keys that would provide the same resultant hash?
There's a higher chance of getting a collision assuming a random distribution. As for actually improving performance....probably not. At best you could get false-positives.


Messages In This Thread
Breaking SHA1-HMAC - by feedworks - 07-31-2013, 05:01 AM
RE: Breaking SHA1-HMAC - by Mangix - 07-31-2013, 09:37 AM
RE: Breaking SHA1-HMAC - by philsmd - 07-31-2013, 06:01 PM
RE: Breaking SHA1-HMAC - by feedworks - 07-31-2013, 06:07 PM
RE: Breaking SHA1-HMAC - by philsmd - 07-31-2013, 06:58 PM
RE: Breaking SHA1-HMAC - by feedworks - 08-01-2013, 12:17 AM
RE: Breaking SHA1-HMAC - by philsmd - 08-01-2013, 02:22 AM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 04:09 PM
RE: Breaking SHA1-HMAC - by Mangix - 08-01-2013, 03:05 AM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 02:22 AM
RE: Breaking SHA1-HMAC - by philsmd - 08-01-2013, 04:23 PM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 04:51 PM
RE: Breaking SHA1-HMAC - by toaster - 08-01-2013, 06:47 PM