[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Ok so I have a password saved in a text file as '¸¾»£¼¡§ˆ™‰'
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 31
Thread images: 3
File: WIN_20151125_141138 (2).jpg (90 KB, 1280x720) Image search: [Google]
WIN_20151125_141138 (2).jpg
90 KB, 1280x720
Ok so I have a password saved in a text file as '¸¾»£¼¡§ˆ™‰' and I need to decrypt it so that I can access a database.

Can any of you guess how it's been encrypted? Cheers.
>>
>encrypting passwords
>>
>>54739816

OP here, it's not my database, I nicked it from somewhere.
>>
>>54739844
give it back jamal
>>
>>54739794
Looks like a simple ECI function, take the derivative and you get back the ascii "hunter2". You really shouldn't store passwords like this, OP
>>
>>54739794
You cant guess the encryption scheme used just by looking at it
>>
File: 1456363270416.gif (3 MB, 640x360) Image search: [Google]
1456363270416.gif
3 MB, 640x360
>>
>>54739844

Firstly there was no reason to give us the ASCII, it clearly isn't meant to be used like that.

Second passwords are hashed no encrypted, go read up on the difference.

Third you could try a hash cracker like John the Ripper I guess
>>
>>54739863
thanks! will try this :)
>>
>>54739899
the sum of the ascii values is about 1000, it's not a hash.

>>54739909

this didn't work :/ will read up on ECI functions though
>>
>>54739937
If that password is encrypted with a secret key, it is literally impossible to decrypt.
>>
>>54740076
>L I T E R A L L Y
it "literally" isn't
>>
>>54740101
YES, twit, it is. Otherwise, I'd love to hear your explaination of how to do so.
>>
>>54740135
>Otherwise, I'd love to hear your explaination of how to do so.
If ‘p’ is encrypted with a secret key ‘s’ then p = E(s,x), ergo D(s,p) = D(s,E(s,x)) = x decrypts it.

All you gotta do is find (D,s) such that D(s,x) unlocks the database.
>>
File: 1432790501924.jpg (187 KB, 450x663) Image search: [Google]
1432790501924.jpg
187 KB, 450x663
>>54740135
Not >>54740101 here:
try every possible decryption key?
>>
>>54740101
That password could be complete gibberish known only to the user, so crypyanalysis wont work. And if OP has the time to brute force the fucking password, he can just brute force the fucking database hes trying to get into.
>>
>>54740239
>That password could be complete gibberish known only to the user
But it probably isn't
>>
>>54740218
Hes trying to decrypt the password, not the database, nimrod. >>54740239
>>
>>54740275
But if you know ‘D’ and ‘s’ you can still decrypt the password, therefore it's possible.

>>54740275
>Hes trying to decrypt the password, not the database
>>54739794
>I need to decrypt it so that I can access a database.
>>
>>54740696
He doesnt know D or S, you idiot, that's the fucking point.
>>
>>54740696
Here, lets do a little thought experiment, I've encrypted 32 bits of data with my secret key, the result, in ascii, is "aaaa".

Please tell me the original four letters and the key that I used, uaing youragical algorithm.
>>
>>54740901
That doesn't make it “literally impossible”. It just means he needs to find out what D or s are. (Which, incidentally, are both possible via brute search)
>>
>>54741012
>Please tell me the original four letters and the key that I used, uaing youragical algorithm.
Tell me the encryption algorithm and secret key used, and I'll tell you what the original 32 bits were.
>>
>>54739937
>the sum of the ascii values is about 1000, it's not a hash.
my fucking sides
>>
>>54739794

No we won't help you getting into that db.

Read the rules.
>>
>>54741703
Sure, anything is brute forcable given enough time. You'd just be waiting many trillions of years if the crypto was decent.
>>
>>54740135
Just brute force it with every encryption protocol known to man. It's really easy if you have access to NSA level computing.
>>
Convert this if you are a true hacka

01000011 01100101 01110010 01110100 01101001 01100110 01101001 01100101 01100100 00100000 01000011 01110101 01100011 01101011
>>
>>54740239
>And if OP has the time to brute force the fucking password, he can just brute force the fucking database hes trying to get into.
Isn't that the same thing? He needs the password to get into the database.
>>
>stealing laptops
How about you just give it back
>>
>>54742164
>if the crypto was decent
$50 says OP's password was not “decent”
Thread replies: 31
Thread images: 3

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.