Bitcoin Forum
June 23, 2024, 02:19:17 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 »  All
  Print  
Author Topic: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas... SOLVED!!  (Read 13586 times)
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 07:22:58 AM
 #61

Naw - this invalidates the searches I made earlier. Not that it would have helped as it sounds like the salt mod is difficult to guess.

Seems like we are all helping each other out (in true Christmas spirit!) so I reveal that I use JohnTheRipper to get 10k+ passwords/sec per core. You can't use it out of the box, but you will find a special modded version helpful for GPG  Wink

We're playing n equal grounds here so I'd say let out the 3rd hint at 100 verifications! We need it! Cheesy

As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 07:31:45 AM
 #62

Naw - this invalidates the searches I made earlier. Not that it would have helped as it sounds like the salt mod is difficult to guess.

Seems like we are all helping each other out (in true Christmas spirit!) so I reveal that I use JohnTheRipper to get 10k+ passwords/sec per core. You can't use it out of the box, but you will find a special modded version helpful for GPG  Wink

We're playing n equal grounds here so I'd say let out the 3rd hint at 100 verifications! We need it! Cheesy

As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.
care to share jtr for GPG?

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 07:35:25 AM
 #63

I think JohnTheRipper can run using opencl. At least experimental. I sold off all my GPUs a coulpe of months ago so I can't try it out though.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

Oh I see - sorry about that - that was an unintended extra complication.

no problem, would be boring if its easy Tongue
Ya, would be a real bummer if I worked everything out and actually had guessed the salt pattern right but still was getting wrong hashes to test in gpg. Now I've got my C code to work, using openssl for hashing, and for some reason it actually runs faster with hashed pwds than when I tested with 4 char plain pwds. 300 pwd/s vs. 260 pwds/s. Weird. Anyway, I'm fairly sure now it's doing the right work and now it's just a matter of trying different salt patterns (and waiting for each full cycle). It currently cycles thru every 4 char pwd combination.

I'd love to find a way to push the gpg key decode test onto a GPU. If it could get even close to vanitygen speed then it would takes a few seconds to test each salt pattern. Hence, the security of this method depends on the gpg key decode algorithm not being ported to GPU.


My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 07:36:55 AM
 #64

care to share jtr for GPG?

Google is your friend!

But, what the h-ll... It's Christmas, right?
http://www.ubuntuvibes.com/2012/10/recover-your-gpg-passphrase-using-john.html

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 07:46:13 AM
 #65

care to share jtr for GPG?

Google is your friend!

But, what the h-ll... It's Christmas, right?
http://www.ubuntuvibes.com/2012/10/recover-your-gpg-passphrase-using-john.html
i didnt google to be honest as i asked for what solution hes using, well i guess its going to be the same. ty anyways Smiley

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
BkkCoins
Hero Member
*****
Offline Offline

Activity: 784
Merit: 1009


firstbits:1MinerQ


View Profile WWW
December 26, 2012, 07:56:29 AM
Last edit: December 26, 2012, 08:16:10 AM by BkkCoins
 #66

Well, it is Xmas and I doubt I'm going to see this thru to the end anyway - so here's my Xmas gift...

( I tried to give the clue nasty before above!)

See nasty for C code to adapt below. If I decide not to bother then I'll give up my enhancements to nasty to let others play. I've added code to do the salt pattern and hashing and allow selecting a gpg key when it's not the default one on the keyring. I may alter it to support multiple threads if it proves not too hard, or perhaps a start pwd value so I can split it onto multiple machines each doing some range.

http://www.vanheusden.com/nasty/

(Note he states this could be 100x faster if done differently. I gather he's talking about using underlying decrypt code and testing per byte so it can be cut short sooner. But I have not looked into that.)

I guess I should be looking for jtr as well.

edit: Found. nice. even supports GPUs, will test that now...

phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 08:16:25 AM
 #67

care to share jtr for GPG?

Google is your friend!

But, what the h-ll... It's Christmas, right?
http://www.ubuntuvibes.com/2012/10/recover-your-gpg-passphrase-using-john.html
i didnt google to be honest as i asked for what solution hes using, well i guess its going to be the same. ty anyways Smiley

Yep - That's what I'm using Smiley

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
cedivad
Legendary
*
Offline Offline

Activity: 1176
Merit: 1001



View Profile
December 26, 2012, 08:19:05 AM
 #68

I would like to get into this but i'm GPG ignorant to the point that i dont ven know what command to launch to verify if a guessed password will open it. I think to have understood that he used the private key he posted to encrypt the secret, but how did he encrypt the private key?
:/

My anger against what is wrong in the Bitcoin community is productive:
Bitcointa.lk - Replace "Bitcointalk.org" with "Bitcointa.lk" in this url to see how this page looks like on a proper forum (Announcement Thread)
Hashfast.org - Wiki for screwed customers
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 08:19:26 AM
 #69


edit: Found. nice. even supports GPUs, will test that now...

Nice! I blame myself for not keeping at least on GPU to play with opencl with. Just out of curiosity, could you post the speeds you get with a GPU cracking GPG?

Just let me know if you need any help with building etc.

Thanks!

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
CIYAM (OP)
Legendary
*
Offline Offline

Activity: 1890
Merit: 1078


Ian Knowles - CIYAM Lead Developer


View Profile WWW
December 26, 2012, 08:26:51 AM
 #70

...but how did he encrypt the private key?

The GPG private key was of course encrypted by GPG itself (using standard settings) with a password that is actually an SHA256 hash (as hex) - the script shown in the OP was what I used to convert a 4 character password into the hash (with the key point that I modified a line of the script that adds "salt" to the weak password to strengthen it before hashing).

I have put the script into a "code block" in order to make the OP clearer (the script itself was unchanged from that in the original OP version).

With CIYAM anyone can create 100% generated C++ web applications in literally minutes.

GPG Public Key | 1ciyam3htJit1feGa26p2wQ4aw6KFTejU
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 08:33:08 AM
 #71


edit: Found. nice. even supports GPUs, will test that now...

Nice! I blame myself for not keeping at least on GPU to play with opencl with. Just out of curiosity, could you post the speeds you get with a GPU cracking GPG?

Just let me know if you need any help with building etc.

Thanks!
john supports OpenCL and CUDA, altough only some hashalgos/implementations, GPG not (as far ive read) yet.

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 08:34:32 AM
 #72

...but how did he encrypt the private key?

The GPG private key was of course encrypted by GPG itself (using standard settings) with a password that is actually an SHA256 hash (as hex) - the script shown in the OP was what I used to convert a 4 character password into the hash (with the key point that I modified a line of the script that adds "salt" to the weak password to strengthen it before hashing).


I'm sure you are all aware, I just like to point out that the security of any real crypto system never should rely on the secrecy of the salt or key derivation function. It should be based on the secret key only. But in this game we know that this secret key is weak and the main problem is the unknown parts of the key derivation function a.k.a. security by obscurity.

So in a cryptographic sense the salt does not add any strength.

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 08:39:03 AM
 #73

...but how did he encrypt the private key?

The GPG private key was of course encrypted by GPG itself (using standard settings) with a password that is actually an SHA256 hash (as hex) - the script shown in the OP was what I used to convert a 4 character password into the hash (with the key point that I modified a line of the script that adds "salt" to the weak password to strengthen it before hashing).


I'm sure you are all aware, I just like to point out that the security of any real crypto system never should rely on the secrecy of the salt or key derivation function. It should be based on the secret key only. But in this game we know that this secret key is weak and the main problem is the unknown parts of the key derivation function a.k.a. security by obscurity.

So in a cryptographic sense the salt does not add any strength.
the salt is what we have to "crack" unlike otherwise the pw Tongue

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 08:42:11 AM
 #74

the salt is what we have to "crack" unlike otherwise the pw Tongue

Yes - we are lucky that it's not that hashing or encryption algo that is the target!

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 09:08:48 AM
 #75

Wow, didn't realize we are at 97 confirms already! I guess I'll be home when we hit 100 and will give my scripts a go if we get "a really good hint".

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 09:18:33 AM
 #76

Wow, didn't realize we are at 97 confirms already! I guess I'll be home when we hit 100 and will give my scripts a go if we get "a really good hint".
what kind of CPU are you using for 10200h/s? which clock?

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 09:27:08 AM
 #77

what kind of CPU are you using for 10200h/s? which clock?

That's a good 'ol i5 2500k @ stock clock. I compiled jtr with 'make linux-x86-64-native'.

In some of my later runs I saw the speed drop to ~10'000. Not sure if the 10'200 was a glitch or my box just was a bit more busy with other crap during the later run. But the whole key space took about 22 minutes so the speed is there somewhere.

::EDIT
62^4 / 10'200 = 1448 s = 24.1 minutes
62^4 / 10'000 = 1478 s = 24.6 minutes

So acctually the average speed must have been like 11'100 /s

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 09:29:54 AM
 #78

what kind of CPU are you using for 10200h/s? which clock?

That's a good 'ol i5 2500k @ stock clock. I compiled jtr with 'make linux-x86-64-native'.

In some of my later runs I saw the speed drop to ~10'000. Not sure if the 10'200 was a glitch or my box just was a bit more busy with other crap during the later run. But the whole key space took about 22 minutes so the speed is there somewhere.
r u sure u get 10k? i got a 2700k OC at 5GHz, and i only get 7500! compiled the same way lol

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
phr33
Full Member
***
Offline Offline

Activity: 226
Merit: 100


View Profile
December 26, 2012, 09:32:15 AM
 #79

what kind of CPU are you using for 10200h/s? which clock?

That's a good 'ol i5 2500k @ stock clock. I compiled jtr with 'make linux-x86-64-native'.

In some of my later runs I saw the speed drop to ~10'000. Not sure if the 10'200 was a glitch or my box just was a bit more busy with other crap during the later run. But the whole key space took about 22 minutes so the speed is there somewhere.
r u sure u get 10k? i got a 2700k OC at 5GHz, and i only get 7500! compiled the same way lol

Oh my. Well yes I'm pretty sure. An obviously I use dictionary mode to cope with the custom key derivation function...

My BTC input: 1GAtPwoTGPQ35y9QugJueum5GzaEzLYjiQ
My GPG ID: B0CCFD4A
K1773R
Legendary
*
Offline Offline

Activity: 1792
Merit: 1008


/dev/null


View Profile
December 26, 2012, 09:34:04 AM
 #80

what kind of CPU are you using for 10200h/s? which clock?

That's a good 'ol i5 2500k @ stock clock. I compiled jtr with 'make linux-x86-64-native'.

In some of my later runs I saw the speed drop to ~10'000. Not sure if the 10'200 was a glitch or my box just was a bit more busy with other crap during the later run. But the whole key space took about 22 minutes so the speed is there somewhere.
r u sure u get 10k? i got a 2700k OC at 5GHz, and i only get 7500! compiled the same way lol

Oh my. Well yes I'm pretty sure. An obviously I use dictionary mode to cope with the custom key derivation function...
i use a previously generated wordlist (generated by a tool i wrote), how r u using the dictionary mode?

[GPG Public Key]
BTC/DVC/TRC/FRC: 1K1773RbXRZVRQSSXe9N6N2MUFERvrdu6y ANC/XPM AK1773RTmRKtvbKBCrUu95UQg5iegrqyeA NMC: NK1773Rzv8b4ugmCgX789PbjewA9fL9Dy1 LTC: LKi773RBuPepQH8E6Zb1ponoCvgbU7hHmd EMC: EK1773RxUes1HX1YAGMZ1xVYBBRUCqfDoF BQC: bK1773R1APJz4yTgRkmdKQhjhiMyQpJgfN
Pages: « 1 2 3 [4] 5 6 7 8 9 10 11 12 13 14 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!