Pages:
Author

Topic: Solve a riddle, guess a 4 char password and add 10 BTC to your xmas... SOLVED!! - page 11. (Read 13586 times)

full member
Activity: 226
Merit: 100
I think JohnTheRipper can run using opencl. At least experimental. I sold off all my GPUs a coulpe of months ago so I can't try it out though.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

Oh I see - sorry about that - that was an unintended extra complication.

no problem, would be boring if its easy Tongue
Ya, would be a real bummer if I worked everything out and actually had guessed the salt pattern right but still was getting wrong hashes to test in gpg. Now I've got my C code to work, using openssl for hashing, and for some reason it actually runs faster with hashed pwds than when I tested with 4 char plain pwds. 300 pwd/s vs. 260 pwds/s. Weird. Anyway, I'm fairly sure now it's doing the right work and now it's just a matter of trying different salt patterns (and waiting for each full cycle). It currently cycles thru every 4 char pwd combination.

I'd love to find a way to push the gpg key decode test onto a GPU. If it could get even close to vanitygen speed then it would takes a few seconds to test each salt pattern. Hence, the security of this method depends on the gpg key decode algorithm not being ported to GPU.

legendary
Activity: 1792
Merit: 1008
/dev/null
Naw - this invalidates the searches I made earlier. Not that it would have helped as it sounds like the salt mod is difficult to guess.

Seems like we are all helping each other out (in true Christmas spirit!) so I reveal that I use JohnTheRipper to get 10k+ passwords/sec per core. You can't use it out of the box, but you will find a special modded version helpful for GPG  Wink

We're playing n equal grounds here so I'd say let out the 3rd hint at 100 verifications! We need it! Cheesy

As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.
care to share jtr for GPG?
full member
Activity: 226
Merit: 100
Naw - this invalidates the searches I made earlier. Not that it would have helped as it sounds like the salt mod is difficult to guess.

Seems like we are all helping each other out (in true Christmas spirit!) so I reveal that I use JohnTheRipper to get 10k+ passwords/sec per core. You can't use it out of the box, but you will find a special modded version helpful for GPG  Wink

We're playing n equal grounds here so I'd say let out the 3rd hint at 100 verifications! We need it! Cheesy

As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.
hero member
Activity: 784
Merit: 1009
firstbits:1MinerQ
you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

Oh I see - sorry about that - that was an unintended extra complication.

no problem, would be boring if its easy Tongue
Ya, would be a real bummer if I worked everything out and actually had guessed the salt pattern right but still was getting wrong hashes to test in gpg. Now I've got my C code to work, using openssl for hashing, and for some reason it actually runs faster with hashed pwds than when I tested with 4 char plain pwds. 300 pwd/s vs. 260 pwds/s. Weird. Anyway, I'm fairly sure now it's doing the right work and now it's just a matter of trying different salt patterns (and waiting for each full cycle). It currently cycles thru every 4 char pwd combination.

I'd love to find a way to push the gpg key decode test onto a GPU. If it could get even close to vanitygen speed then it would takes a few seconds to test each salt pattern. Hence, the security of this method depends on the gpg key decode algorithm not being ported to GPU.
legendary
Activity: 1792
Merit: 1008
/dev/null
you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

Oh I see - sorry about that - that was an unintended extra complication.

no problem, would be boring if its easy Tongue
legendary
Activity: 1890
Merit: 1078
Ian Knowles - CIYAM Lead Developer
you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.

Oh I see - sorry about that - that was an unintended extra complication.
legendary
Activity: 1792
Merit: 1008
/dev/null
As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.

you misunderstood him.
Code:
password=`echo $password | sha256sum`
this pipes the password to sha256sum and adds \n at the end, so yes u have to put \n at the end when brute forcing.
legendary
Activity: 1890
Merit: 1078
Ian Knowles - CIYAM Lead Developer
As the password was put onto the clipboard (at the end of the script) and then later "pasted" into the password prompt from GPG the LF is not actually *in* the actual hash that was used.
hero member
Activity: 784
Merit: 1009
firstbits:1MinerQ
Just wanted to double check the script you listed above is "as used". I noticed that by default the echo command will add a newline (\n) to the salted pwd. So the hash would include the "hidden" newline. I was testing my C code and found that the libcrypto (openssl) does not add a newline when doing sha256 (of course). So then I thought what if, even through good intentions, you maybe generated the has differently not realizing that a newline was/wasn't added.

tldr; just checking the salted pwd would indeed have that newline on the end...
legendary
Activity: 1792
Merit: 1008
/dev/null
Am very appreciative of the effort being put into this and am guessing that unless there is a hacker with a lot of free computing power it will be very much a case of luck with the "riddle" at this stage (and as promised then next hint won't really make much difference).
computing power isnt the problem atm, its the salt.
legendary
Activity: 1890
Merit: 1078
Ian Knowles - CIYAM Lead Developer
Am very appreciative of the effort being put into this and am guessing that unless there is a hacker with a lot of free computing power it will be very much a case of luck with the "riddle" at this stage (and as promised the next hint won't really make much difference).
legendary
Activity: 1792
Merit: 1008
/dev/null
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).

Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

I'm only able to check about 264 pwds/sec on my laptop but I'm still seeing if there is a better method than I've found. I've modified a "found" program to brute force gpg. If I can improve this sufficiently then I may start an EC2 instance to go at it faster. I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge. Seems unsportsman-like.
C code?

I thought I was the one coming from behind as right now I'm on a measly Core2Duo laptop, and only using one thread. I wanted to adapt the code for sha256 and then add multi-threading, and then finally get it running on a faster computer. The salting algorithm can be "trial by hand" as a 4-char cycle is still about 15 hours for me. If I can get it to < 1 hour then I'd add reading a salt template from a file.

I'll not give my own code mods but for starts: I'm nasty and google is your friend.

You'll want to install the gpgme library, (sudo apt-get install libgpgme11-dev)
and even after that do some reading before you can compile due to large file support.

This way works but I'm by no means certain that there isn't some much faster method.

BTW: A word of warning, don't pump gpg with pwds without disabling the gpg-agent first. I got into a real pickle when the agent popped up with a "safe pwd window" for each password attempt. Ouch. But fast fingers with exiting the terminal actually worked. You can set the env variable to prevent that... eg.

GPG_AGENT_INFO='' myhackingprog

This is what happens when you're an amateur.
i used "--no-use-agent --homedir" with homedir pointing to a special folder only for this.
till date i dont have it implemented in C, gonna do that later.
hero member
Activity: 784
Merit: 1009
firstbits:1MinerQ
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).

Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

I'm only able to check about 264 pwds/sec on my laptop but I'm still seeing if there is a better method than I've found. I've modified a "found" program to brute force gpg. If I can improve this sufficiently then I may start an EC2 instance to go at it faster. I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge. Seems unsportsman-like.
C code?

I thought I was the one coming from behind as right now I'm on a measly Core2Duo laptop, and only using one thread. I wanted to adapt the code for sha256 and then add multi-threading, and then finally get it running on a faster computer. The salting algorithm can be "trial by hand" as a 4-char cycle is still about 15 hours for me. If I can get it to < 1 hour then I'd add reading a salt template from a file.

I'll not give my own code mods but for starts: I'm nasty and google is your friend.

You'll want to install the gpgme library, (sudo apt-get install libgpgme11-dev)
and even after that do some reading before you can compile due to large file support.

This way works but I'm by no means certain that there isn't some much faster method.

BTW: A word of warning, don't pump gpg with pwds without disabling the gpg-agent first. I got into a real pickle when the agent popped up with a "safe pwd window" for each password attempt. Ouch. But fast fingers with exiting the terminal actually worked. You can set the env variable to prevent that... eg.

GPG_AGENT_INFO='' myhackingprog

This is what happens when you're an amateur.
newbie
Activity: 32
Merit: 0
264 pwds/sec!

At 12 pwds/sec, I see that I still have a lot of work to do... good night
legendary
Activity: 1792
Merit: 1008
/dev/null
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).

Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

I'm only able to check about 264 pwds/sec on my laptop but I'm still seeing if there is a better method than I've found. I've modified a "found" program to brute force gpg. If I can improve this sufficiently then I may start an EC2 instance to go at it faster. I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge. Seems unsportsman-like.
C code?
legendary
Activity: 1792
Merit: 1008
/dev/null
Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

...I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge....

Okay - if others feel the same then I won't make the next clue as revealing as I was going to (and any clue after that will not be released until the new year).

perfect Smiley
legendary
Activity: 1890
Merit: 1078
Ian Knowles - CIYAM Lead Developer
Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

...I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge....

Okay - assuming others feel the same then I won't make the next clue as revealing as I was going to (and any clue after that will not be released until the new year).
hero member
Activity: 784
Merit: 1009
firstbits:1MinerQ
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).

Why not? You stated before you wouldn't empty the address until Jan 3rd. It takes time to figure out best ways to approach this and then implement. If you are attempting to evaluate the security model it seems counter-productive to cop out by reducing the difficulty too soon.

I'm only able to check about 264 pwds/sec on my laptop but I'm still seeing if there is a better method than I've found. I've modified a "found" program to brute force gpg. If I can improve this sufficiently then I may start an EC2 instance to go at it faster. I'd hate to spend too much effort and then just have you void it all by giving it away or closing the challenge. Seems unsportsman-like.
legendary
Activity: 1890
Merit: 1078
Ian Knowles - CIYAM Lead Developer
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.

Well the next hint (if it's still unclaimed after 100 confirmations) should make it dramatically easier (as I am not going to let this drag out for too long).
hero member
Activity: 742
Merit: 500
Interesting puzzle. "(at least)" isn't giving me any great ideas tho.
Pages:
Jump to: