Crack decrypted key with unknown salt - General Questions and Answers

Can you brute force a salted hash with a unknown salt?

IMO the salt must be known to retrieve the unsalted hash.

jwoegerbauer said:
IMO the salt must be known to retrieve the unsalted hash.
Click to expand...
Click to collapse
Does this mean what I am trying out is impossible?

Not impossible, but would require a computer with enormous computing power.
For example, imagine you have a small salt with 4 digits, each from 0-9. You don't know its value.
So you set all the numbers back to 0 and try them one by one: 0001, 0002, 0003, and so on until it matches. In the worst case scenario, it would take 10,000 tries to find the salt used.

jwoegerbauer said:
Not impossible, but would require a computer with enormous computing power.
For example, imagine you have a small salt with 4 digits, each from 0-9. You don't know its value.
So you set all the numbers back to 0 and try them one by one: 0001, 0002, 0003, and so on until it matches. In the worst case scenario, it would take 10,000 tries to find the salt used.
Click to expand...
Click to collapse
Is this always the case even if I have the hashed value just doesn't know to decrypt it.

To clarify things:
Salting is the act of adding a series of random numbers and/or characters to a hash:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

jwoegerbauer said:
To clarify things:
Salting is the act of adding a series of random numbers and/or characters to a hash:
Click to expand...
Click to collapse
Yes I understand how it works but is there a software that can brute force this? I already have the highlighted text and want to extract the password but I don't know the salt. And the salt can be on any part (beginning, middle or end) of the string right?

samuel103195 said:
Yes I understand how it works but is there a software that can brute force this?
Click to expand...
Click to collapse
IDK. Have never dealt with it.

Related

Storage Speed / Device Encryption

I have been toying around a bit with the feature of full phone encryption (not just the apps and data but also the "sdcard" internal storage partition.
Observation 1 (which may or not be known or evident to you already, but which I still find odd): It is possible to encrypt a "full" or half full device, but it seems to be not possible to go and decrypt the device again later on while retaiing the data (assuming the right password of course). Being a long time user of Truecrypt I find this irritating, one could of course argue it is safety measure of some kind, but I really would see no harm in enabling the possibility. As the password would of course be required to get into the system and initiate the decryption process there is no additional risk - if the attacker already has the password he can use it to gain access and copy the plaintexted data someplace else anyways. So is this caused by architecture of the pre boot authorization, just sloppy and careless coding or am I missing something vital here?
Observation 2: The performance impact with encryption enabled is worse than I would have dared to believe. I used two different SD Card Speed measurement apps from the market to test speed on a regular, non-encrypted setup and on an encrypted setup.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Encryption enabled
Plaintext operation
All other settings in the apps and the device were identical.
Is this sloppy coding or are the Snapdragon CPU just ill-equipped to handle encryption algorithms efficiently enough? I don't really want to get into a grassroots debate here over how useful encryption may or may not be on a device that most of us want s-off and rooted, therefore allowing all sorts of exploits etc. but I am honestly surprised by the heavy performance hit.
Does anyone know what algorithms are used? I assume some run of the mill AES?

[APP] Hotstrings - NEEDS testers or should I continue making this?

OK so this is a sort of experimental app that needs some testers. It's not in play yet but the apk is attached to the bottom of the OP. I'm just curious how many people would find something like this useful and wonder if I should carry on making it or just abandon it. Basically the app works as a sort of shortcut for frequently typed phrases or whatever that you may constantly type out that you may not want to. So you create a keyword and a string of text associated with that keyword. You can now cycle through keywords via the widget or the app itself and click on the keyword and have the associated text copied to clipboard for easy pasting wherever you may want
widget usage:
- Click left/right arrows to cycle database
- Click keyword/string to copy to clipboard
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
APK:
http://ompldr.org/vaTJyMg/hotstrings.apk
Would you mind explaining it a little better?
[Sry my native language isn't english]
I didn't get it. What exactly does it do?
Sent from my GT-I9070 using xda premium
http://www.autohotkey.com/docs/Hotstrings.htm
That link will give you an idea of what they are. I think what needs to happen for this to be worthwhile is a needs a custom kb to work with since you are unable to interact with these keywords in other apps(hence the clipboard). With a keyboard I could have a keyword for a really long bit of a text and I just type the keyword out and it will autoreplace with the associating string saving you time.
nlygamz said:
Would you mind explaining it a little better?
[Sry my native language isn't english]
Click to expand...
Click to collapse
Basically, you create short texts that expand to the full phrase/sentence you like. The only similar app I found was https://play.google.com/store/apps/details?id=com.agileapps.autocorrecteditor&feature=search_result which has fairly negative reviews and still has 500-1000 downloads. I expect this is about the size of audience the hotstrings app would get, perhaps slightly more if it is rated more positively.
Hi I know this is old but I'm looking for something like this! I had this option on my iPhone way back when, it's the only thing I miss about it. I use the Swype keyboard so I don't know if that will conflict with your app but it's worth a shot! The link seems to be down, is there any way I could get this apk to try out?

Apple Wave [Important] 💀

Hello.
Just saw the Video from TechRax (31 % - 38 %)
...but don't ever try this! With aný phoñe‼
Apple Wave IS actually Haox!
If the phone would be a few seconds longer in the Microwave, it would be boom! Dead. ? ?
The higher Percentage is just, because the Microwave-Waves did hit the Hardware so the percentage can't be calculated properly. Or somehow...
The idea of „Apple Wave for iOS 8“ is from some idiots‼‼‼
Microwaves are dangerous for any kind of phone hardware which is not nanocoated!‼
TechRax makes nice tests, but if he would do that for 6 Seconds in row with 3 % Battery Percentage, the phone would maybe display 41 % after it rallied, but then those 41%'s would be over in 10 Minutes or so!
▲Not to Forget:
Such a small battery can't be charged up soo fast!
You need bigger batteries with lower capacities for a faster
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
- impossible with a high-end smartphone of today.
It's a HOAX?!?! Really?!?!
Microwaves are dangerous for any kind of phone hardware which is not nanocoated!‼
Click to expand...
Click to collapse
How stupid are you, and how stupid do you think the rest of us are?
Somebody lock this bull$#!+ down. Better yet, delete it or move it to whatever back-end section this forum has for this kind of garbage.
Planterz said:
It's a HOAX?!?! Really?!?!
How stupid are you, and how stupid do you think the rest of us are?
Somebody lock this bull$#!+ down. Better yet, delete it or move it to whatever back-end section this forum has for this kind of garbage.
Click to expand...
Click to collapse
Hey, that's not nice of you.
I'm not stupid ...but there are really people who do this at home!
Even the Police warns out of it! (because too long in the microwave can make the phone explode or burn etc.)
Hannah Stern said:
Even the Police warns out of it! (because too long in the microwave can make the phone explode or burn etc.)
Click to expand...
Click to collapse
Then let's leave the professionals to do their job and not interfere.
Thread closed.

[SECURITY] potential malware on dev-host servers

Yesterday I spent some time after downloading an empty theme template .zip off dev-host going over the dev-host connections and the malware that lurks right next to the button you need to push to download something.
I tested this on multiple networks and different operating systems and essentially it was a module watcher that caught it. Then I did a run down through PFSense firewall seeing what it was trying to do. This is not localized to one server as far as I can tell since I tested on several different server ip addresses and all did the same thing. So I guess this is a notice to the community and to dev-host who I imagine doesn't know several of there servers have been attacked with malware resulting in a phishing attack url attacged to a local button.
I could show you all the nitty-gritty firewall details and how the phising attack works but yeah thats to much time I'll just show you what button NOT to push on dev-host:
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Clicking the orange download button results in an instant phishing attack. For those of you who dont know what a phising attack is let me explain:
Essentially it's a way of tricking you into thinking your browser is going somewhere its not. Which can result in many things ie: theft of data/malware/viruses/network attacks/trojan droppers and many many other nasty's most people really hate. I have tested where it goes and its completely random and its not this specific zip or this specific page its just the first one I tested it on. So one or more of the dev-hosts servers are infected. PFSense has blocked the crap out of it every time along with module watchers and even some very low lvl malware software may block it. Figured I'd share this information.
Oh and Id also like to say I use every adblocker and adblocker+ and several other ad blocking extensions and the button you need to click is right below it. So its definitely something to keep an eye out for. I'm usually very careful about what button I click. So I usually never even run into these situations but yeah. Figured I'd share to the community and to Dev-host

Question CTP Chinese Menu Screen

Was attempting to boot into the downloader screen and ended up on this...
How on earth do I escape and reboot the phone?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I think it is korean, as Samsung is a Korean company. Try to force reset it (power and volume down) and if that does not work, try to translate the menu and see what you get.
It's a cheap clone you've bought, tell be you didn't pay more than 100 for it
Darbar1701 said:
It's a cheap clone you've bought, tell be you didn't pay more than 100 for it
Click to expand...
Click to collapse
How do you know?
update: is it the corners?
Arealhooman said:
I think it is korean, as Samsung is a Korean company. Try to force reset it (power and volume down) and if that does not work, try to translate the menu and see what you get.
Click to expand...
Click to collapse
Nope, this is Chinese.
It says CTP 测试 (CTP Test)
自由触屏测试 (touchscreen test)
测试通过 (test passed)
测试失败 (test failed)
拨打112成功 (call/dial 112 succeeded)
Comparing the camera & screen (esp the bezel) to mine, it looks like it's a clone. You can run the IMEI but I'm sure they faked that as well, if it is a clone.
Thatsgonnaleaveamark said:
Nope, this is Chinese.
It says CTP 测试 (CTP Test)
自由触屏测试 (touchscreen test)
测试通过 (test passed)
测试失败 (test failed)
拨打112成功 (call/dial 112 succeeded)
Comparing the camera & screen (esp the bezel) to mine, it looks like it's a clone. You can run the IMEI but I'm sure they faked that as well, if it is a clone.
Click to expand...
Click to collapse
I said that before I knew it was fake.
Arealhooman said:
I said that before I knew it was fake.
Click to expand...
Click to collapse
Well, I wasn't trying to start anything, just clarify what it says.

Categories

Resources