Support added to crack 1Password to oclHashcat-plus, 100% computed on GPU! Plus I found an exploitable design flaw http://hashcat.net/forum/thread-2238.html …
-
-
Replying to @hashcat
@hashcat maybe@jpgoldberg can chime in on the design flaw2 replies 0 retweets 0 likes -
Replying to @jmgosney
@jmgosney@hashcat My guess is@jpgoldberg already realized there was this flaw, and it was a reason why he used SHA-512 in a newer design1 reply 0 retweets 0 likes -
Replying to @solardiz
@solardiz@jmgosney@jpgoldberg The number of calls to SHA512 transforms should be the same compared to SHA1, no?2 replies 0 retweets 0 likes -
Replying to @hashcat
@hashcat@solardiz@jmgosney@jpgoldberg if you needed 256 bits for key+iv you'd need only 1 of PBKDF2-HMAC-SHA-2-512 instead of 2 for SHA-11 reply 0 retweets 0 likes -
Replying to @jpgoldberg
@jpgoldberg@hashcat@solardiz@jmgosney I don't see anything inherently wrong with PBKDF2[HMAC[SHA-1]] (for 160 bits of output :-)1 reply 0 retweets 0 likes -
Replying to @jpgoldberg
@jpgoldberg@hashcat@solardiz@jmgosney I think it'd be appropriate to call it a "flaw" or an "attack" worth (literally) 2 bits of entropy2 replies 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.