DEScrypt: A hash collision security research tool based on CPU

0 23
DEScrypt uses a two-byte salt (composed of characters [a-zA-Z0-9https://www.free...

DEScrypt: A hash collision security research tool based on CPU

DEScrypt uses a two-byte salt (composed of characters [a-zA-Z0-9https://www.freebuf.com/articles/database/][1]) by default, which means that we need to generate about 65536 unique rainbow tables, so the efficiency of using DEScrypt's collision cracking to find plaintext passwords will be higher.

Function introduction

1, Can crack hashes based on file or single input;

2, Support detecting CPU cores;

3, Support adjusting the number of threads;

4, Support comma-separated output files;

5, Clear and readable output display;

6, The average hash rate of 10 threads on a single CPU core is 22000 per second by default;

Tool download

Researchers can use the following command to clone the source code of this project locally:

git clone https://github.com/rek7/DEScrypt-CPU-Collision-Cracker.git

Tool compilation

Next, switch to the project directory in the command line terminal and run the following command to complete the code build:

g++ -std=c++11 src/main.cpp -pthread -lcrypt -O2 -o DEScrypt

Command options

Command         Description

-------         -----------

-l=             File path of hash list

-i=             Single hash

-w=             File path of dictionary list

-o=             File path of output file

-t=             Number of running threads (default is 10)

Tool operation screenshot


License agreement

The development and release of this project followMITOpen source license agreement.

Project address

DEScrypt:【GitHub Gateway

Reference materials

http://man7.org/linux/man-pages/man3/crypt.3.html

你可能想看:

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Burpsuite combined with mitmproxy to achieve encryption and decryption of data

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

Burpy + frida to implement automatic encryption and decryption on Burp

Data security: Data does not land, presenting a variety of allure and resistance, half push and half pull

最后修改时间:
admin
上一篇 2025年03月28日 09:41
下一篇 2025年03月28日 10:03

评论已关闭