Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <BANLkTine=p9dp+1E2LU8puwc5rAacPNJtg@mail.gmail.com>
Date: Wed, 18 May 2011 14:26:54 -0400
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Help with 14 - 16 digit CC's stored in MD5 hash

On Wed, May 18, 2011 at 2:14 PM, RB <aoz.syn@...il.com> wrote:
> An interesting problem, but one fraught with danger for both requester
> and helper.
>
Agreed.
> Sounds like a job for an external filter initially, I doubt there'd be
> enough regularity in such data as to make a new full-fledged format
> necessary.
If it were just digit's, and we know that AMEX/VISA/MC etc... start with
predifined strings of digits, then you cut down 4-6 of the possible char's
you need quite a bit, but they do need "prepended" to each BF attempt
to get the hash right. This could be an interesting candidate for the
"known force" external mode. In addition, if you knew other things like the
format of the expected digit's and their possible separators if any...
1234 5678 9012 3456
1234-5678-9012-3456
1234567890123456
Every character that is added only adds more time, if you knew the format
before hand, you could probably double your speed by not having to try
spaces and dashes if you new there were none...
It's out of my depth, but it is an interesting problem.
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.