DS2432 brute force
#1
Hello all,
I've been reading these forums quite a lot and I believe I already know the answer to my question, but I'll ask it anyways.

I'm trying to find out what's the password recorded in a DS2432 chip. It's just a memory chip from Dallas Semiconductor / Maxim-IC that requires you to send the SHA-1 hash of it's password to record data in it. I logged the communication of a certain machine with this chip, and it shows several hashes of the correct password.

The problem is this: The password is 8 bytes long, from 00h to FFh. And it's salted with 56 additional bytes. So, it's a hash of 64 bytes total. I know the 56 salt bytes. I just need to find out the 8 password bytes.

Now, researching about this, I can imagine this will take several trillion years to brute force, correct? And also, a hash of 64 bytes... is it even possible to brute force the 8 password bytes out of it? Even if I know the salt bytes?

Thanks in advance, and thanks also for the great program!


Messages In This Thread
DS2432 brute force - by Coragem - 12-08-2011, 02:29 AM
RE: DS2432 brute force - by undeath - 12-08-2011, 03:43 AM
RE: DS2432 brute force - by Coragem - 12-08-2011, 03:46 AM
RE: DS2432 brute force - by undeath - 12-08-2011, 04:14 AM
RE: DS2432 brute force - by atom - 12-08-2011, 10:42 AM
RE: DS2432 brute force - by Coragem - 12-08-2011, 05:03 PM