-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add format and extractor script for authenticator
python app master password
#4893
Comments
I think it'd take not only a script, but also a new format in |
authenticator
python app master password extractor scriptauthenticator
python app master password
If someone whips up an |
how to provide a test vectors? base64 encoded 16-bytes IV and 16-bytes encrypted data? sample: |
Thanks! Since the data is so short, hex encoding is fine as well (unless original data happens to be Base64 already, or whatever reason you fancy - it's ultimately up to you). I think this would be nice:
The Many of our tools will include the basename of the input filename as a first (
In that case, the string |
see #4898 |
The AES key is produced using SHA-256 with 256K iterations, you didn't mention that. It will slow things down considerably. Maybe 11Kp/s on a 2080ti or a couple hundred p/s on a good CPU with 8 cores. |
Oh and what we called the IV isn't the IV, it's the cleartext header. The IV is derived from the key. |
Maybe 1024 iterations?
|
It would be nice to have a script that allow to bruteforce master password of
https://github.com/JeNeSuisPasDave/authenticator
it uses the AES 256-bit symmetric key:
https://github.com/JeNeSuisPasDave/authenticator/blob/3caa2edebff01be3e6fd82c72ac3a0eb415cbe66/src/authenticator/data.py#L597-L606
to encrypt the second 16-byte data and compare it with the first 16-byte block (header):
https://github.com/JeNeSuisPasDave/authenticator/blob/3caa2edebff01be3e6fd82c72ac3a0eb415cbe66/src/authenticator/data.py#L802-L807
The text was updated successfully, but these errors were encountered: