-
November 13th, 2014, 09:59 PM
#1
decode this....
maybe someone can hep me. I need the decoded string from 2wwmvmyb5k6io . Decoded it shoud be 8 lowercase latin letters string. I have no idea about cracking so maybe someone here can help me??!
I can give you example of the algorhythm. These are the decoded strings on the right side and on the left side the encoded hashs. All using the same algorhythm.
ljdstt10 - 12345
s91rre697 - 123456
dr3lwni1e4ui0 - 12345678
b2pq20cdzpy1g - password
94n11htaxbpn8 - Password
h3ije1c - test
d6t4nw5kn1chs - aaaaaaaa
2wwmvmyb5k6io - ????????? <<<< this is the string I am looking for
-
November 14th, 2014, 04:49 AM
#2
Re: decode this....
Did you read the Forum Rules?
Victor Nijegorodov
-
November 14th, 2014, 05:57 AM
#3
Re: decode this....
This could be classed as an illegal activity under forum rules.
Why do you want to do this and for what purpose will it be used?
From where did you obtain the encrypted text and the decoded strings?
All advice is offered in good faith only. All my code is tested (unless stated explicitly otherwise) with the latest version of Microsoft Visual Studio (using the supported features of the latest standard) and is offered as examples only - not as production quality. I cannot offer advice regarding any other c/c++ compiler/IDE or incompatibilities with VS. You are ultimately responsible for the effects of your programs and the integrity of the machines they run on. Anything I post, code snippets, advice, etc is licensed as Public Domain https://creativecommons.org/publicdomain/zero/1.0/ and can be used without reference or acknowledgement. Also note that I only provide advice and guidance via the forums - and not via private messages!
C++23 Compiler: Microsoft VS2022 (17.6.5)
-
November 15th, 2014, 02:48 PM
#4
Re: decode this....
Originally Posted by 2kaud
This could be classed as an illegal activity under forum rules.
Why do you want to do this and for what purpose will it be used?
From where did you obtain the encrypted text and the decoded strings?
Taboo to research encryption
-
November 15th, 2014, 03:01 PM
#5
Re: decode this....
Mokaro, Everything depends upon hashing algo. But common thing here is infinite number of solution for each given hash. Meantime, well-dev'ed hash-func restricts the length of input string, therefore number of strings, matched to whatever hash, becomes limited. Such matching can be even unique.
-
November 15th, 2014, 03:44 PM
#6
Re: decode this....
Originally Posted by S@rK0Y
Taboo to research encryption
No. But trying to decrypt an encrypted code is bordering upon illegality depending upon the context which is why the questions - which you haven't answered!
All advice is offered in good faith only. All my code is tested (unless stated explicitly otherwise) with the latest version of Microsoft Visual Studio (using the supported features of the latest standard) and is offered as examples only - not as production quality. I cannot offer advice regarding any other c/c++ compiler/IDE or incompatibilities with VS. You are ultimately responsible for the effects of your programs and the integrity of the machines they run on. Anything I post, code snippets, advice, etc is licensed as Public Domain https://creativecommons.org/publicdomain/zero/1.0/ and can be used without reference or acknowledgement. Also note that I only provide advice and guidance via the forums - and not via private messages!
C++23 Compiler: Microsoft VS2022 (17.6.5)
-
November 15th, 2014, 03:57 PM
#7
Re: decode this....
2kaud, any question about IT may be based upon illegal intentions So, would you like to investigate each one??? Normally opted security is quite strong against even most sophisticated invaders, needless to be worried upon such childish questions
-
November 17th, 2014, 09:50 AM
#8
Re: decode this....
looks like an encryption that turns 8bit binary data into 5bit "readable text"
other than that, hard to tell. it's not a straightforward binary to 5bit conversion or the "password" and "Password" would have been very similar other than the first 2 encoded chars.
so it does have some form of encryption, hashing or running "effect" going as well. Whether it would qualify as actual encryption is another matter entirely. Quite often, a simple obfusction method is enough.
can it be broken: probably although the dataset might be a little too small to do that
but without a clear motivation to do so, not likely you'll find someone that'll do this for free.
-
November 17th, 2014, 09:55 AM
#9
Re: decode this....
Originally Posted by 2kaud
No. But trying to decrypt an encrypted code is bordering upon illegality depending upon the context which is why the questions - which you haven't answered!
One cannot become a good encryption specialist, without also being a good cracker.
part of knowing how and where to protect comes from knowing how a cracker goes about it's things.
I've seen plenty of apps where the front door is the software equivalent of a 1m thick steel vault, but meanwhile have a simple wooden door at the back (which is even unlocked), a couple windows you can climb through and a sunroof that's open to let the fresh air in, oh, and if you wanted to, you can dig a tunnel under the walls too.
-
November 17th, 2014, 01:24 PM
#10
Re: decode this....
Originally Posted by OReubens
One cannot become a good encryption specialist, without also being a good cracker.
part of knowing how and where to protect comes from knowing how a cracker goes about it's things.
I've seen plenty of apps where the front door is the software equivalent of a 1m thick steel vault, but meanwhile have a simple wooden door at the back (which is even unlocked), a couple windows you can climb through and a sunroof that's open to let the fresh air in, oh, and if you wanted to, you can dig a tunnel under the walls too.
Agreed. It comes down to context and purpose. Studying this as apart of a PhD is one thing, studying this in order to crack encrypted passwords obtained from a 'hacked' system is quite another.
All advice is offered in good faith only. All my code is tested (unless stated explicitly otherwise) with the latest version of Microsoft Visual Studio (using the supported features of the latest standard) and is offered as examples only - not as production quality. I cannot offer advice regarding any other c/c++ compiler/IDE or incompatibilities with VS. You are ultimately responsible for the effects of your programs and the integrity of the machines they run on. Anything I post, code snippets, advice, etc is licensed as Public Domain https://creativecommons.org/publicdomain/zero/1.0/ and can be used without reference or acknowledgement. Also note that I only provide advice and guidance via the forums - and not via private messages!
C++23 Compiler: Microsoft VS2022 (17.6.5)
-
November 18th, 2014, 09:13 AM
#11
Re: decode this....
If he already obtained a password list, the real damage is already done imo. It just takes a bit of tenacity/creativity from there on.
I could porbably figure it out from that list and a bit of paper and pencil work within a few hours. It doesn't look like it's real encryption, just basic obfuscation.
-
November 18th, 2014, 02:33 PM
#12
Re: decode this....
If he already obtained a password list, the real damage is already done imo. It just takes a bit of tenacity/creativity from there on.
OReubens, to know algo of hashing & to know how to crack the given hash are slightly different things, at least
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
Click Here to Expand Forum to Full Width
|