Answer the question
In order to leave comments, you need to log in
How to speed up brute force?
In general, there is a line (just an example):
{"data":"ZbGOHhmbCr6SaaQUdMR7cMTXShhzlzpWVqXHA==","iv":"5y1WPN7nqaahg==","salt":"TaKtjVSlsplJKyKn0FzGrJ42BowgeFFssSx1k="}'
import json
try:
data = json.loads(info)
password = passwd
salt = base64.b64decode(data['salt'])
vault = base64.b64decode(data['data'])
iv = base64.b64decode(data['iv'])
except:
return None
key = hashlib.pbkdf2_hmac('sha256', password.encode('utf-8', 'ignore'), salt, 10000, 32)
from Crypto.Cipher import AES
decrypted_block = AES.new(key, AES.MODE_GCM, nonce=iv).decrypt(vault)
try:
if decrypted_block.decode('utf-8', 'ignore').__contains__('"findThis":"'):
something = decrypted_block.decode('utf-8', 'ignore').find('"findThis":"') + 12
something2 = decrypted_block.decode('utf-8', 'ignore').find('","numberOfAccounts"') - 43
decryptedData = decrypted_block.decode('utf-8', 'ignore')[something:][:something2]
return {'data': decryptedData, 'password': passwd}
else:
return None
except:
return None
Answer the question
In order to leave comments, you need to log in
is there an option how to speed up this whole thing to several million combinations per second like hereIron to change, then it is possible. And so - he is a brute and in Africa a brute, everything depends on the percentage, the software environment can win a couple of percent, but even the assembler will not give a serious performance boost on such a task.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question