openssl AES256 with a common standardized Password-Based Key Derivation Function
#14
Evening,

So I was on the github thread and saw this got updated with a new mode added -m 22500.  I did a new build using cygwin and the latest clone.

I have a test key using Multibit 0.5.17 with password "butt"   ./hashcat -m 22500 -a 3 TestButt.key ?a?a?a?a

key file contents is 
U2FsdGVkX18nQPqGL5T70CRS+PJ7VT/se5HvWBt+PkIJeSDp9HKc66oq3P5lU6ZRjHzN0AbMDyTRQONlubreVt3/+X0kGTZTniEIuBAnEfABnNdu/6uuxqLkPsXDhDx8


This file worked correctly in BTCRecover, (however it does run into an issue it ignore "line with character with code point 194 > max and 195 > max) but when I run the following in Hashcat, I get a separator unmatched, no hashes loaded.  Can anyone else verify it works or if an error?

Thank you.
-MAJBatman
Reply


Messages In This Thread
RE: openssl AES256 with a common standardized Password-Based Key Derivation Function - by majbatman - 02-08-2020, 12:03 PM