12-08-2011, 02:29 AM
Hello all,
I've been reading these forums quite a lot and I believe I already know the answer to my question, but I'll ask it anyways.
I'm trying to find out what's the password recorded in a DS2432 chip. It's just a memory chip from Dallas Semiconductor / Maxim-IC that requires you to send the SHA-1 hash of it's password to record data in it. I logged the communication of a certain machine with this chip, and it shows several hashes of the correct password.
The problem is this: The password is 8 bytes long, from 00h to FFh. And it's salted with 56 additional bytes. So, it's a hash of 64 bytes total. I know the 56 salt bytes. I just need to find out the 8 password bytes.
Now, researching about this, I can imagine this will take several trillion years to brute force, correct? And also, a hash of 64 bytes... is it even possible to brute force the 8 password bytes out of it? Even if I know the salt bytes?
Thanks in advance, and thanks also for the great program!
I've been reading these forums quite a lot and I believe I already know the answer to my question, but I'll ask it anyways.
I'm trying to find out what's the password recorded in a DS2432 chip. It's just a memory chip from Dallas Semiconductor / Maxim-IC that requires you to send the SHA-1 hash of it's password to record data in it. I logged the communication of a certain machine with this chip, and it shows several hashes of the correct password.
The problem is this: The password is 8 bytes long, from 00h to FFh. And it's salted with 56 additional bytes. So, it's a hash of 64 bytes total. I know the 56 salt bytes. I just need to find out the 8 password bytes.
Now, researching about this, I can imagine this will take several trillion years to brute force, correct? And also, a hash of 64 bytes... is it even possible to brute force the 8 password bytes out of it? Even if I know the salt bytes?
Thanks in advance, and thanks also for the great program!