DES-ECB & optimization
#1
I have a 'black box' which seems to do some form of ECB - any string file results in blocks of 8byte and blocks are the same for any same text. I am of course not sure which encryption is used, but DES-ECB seems a good guess.


I am currently using
Code:
./hashcat  -a 3 -m 14000 bla.hash -1 charsets/DES_full.charset --hex-charset ?1?1?1?1?1?1?1?1
but that seems to take 15yrs on AWS GPU server :/

I am pretty sure that the above line should try all 8 byte combinations as the password. Also, my input file is in format "encoded_hex:original_text", that is also correct I hope?

I can generate any number of input/output pairs in order to help in cracking. Is it possible to use this fact to improve/optimize the cracking process?


Messages In This Thread
DES-ECB & optimization - by mariniram - 10-25-2016, 11:29 AM
RE: DES-ECB & optimization - by atom - 10-25-2016, 11:41 AM
RE: DES-ECB & optimization - by mariniram - 10-25-2016, 02:19 PM
RE: DES-ECB & optimization - by atom - 10-25-2016, 02:42 PM
RE: DES-ECB & optimization - by mariniram - 10-25-2016, 04:24 PM