Krist - Minable currency that works across servers (paste updated)
#1101
Posted 24 January 2016 - 01:58 PM
#1103
Posted 24 January 2016 - 02:12 PM
And yes, it requires cc.
#1104
Posted 24 January 2016 - 02:17 PM
ry00000, on 24 January 2016 - 02:12 PM, said:
And yes, it requires cc.
Edited by Luca_S, 24 January 2016 - 02:47 PM.
#1105
Posted 24 January 2016 - 02:26 PM
I've ran out of CC options, so it's time for Visual Basic! I think there's an HTTP API for VB somewhere...
#1106
Posted 24 January 2016 - 02:30 PM
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
But these calculations are for a strong GPU cracker, good luck while doing this in CC.
ry00000, on 24 January 2016 - 02:26 PM, said:
#1107
Posted 24 January 2016 - 02:37 PM
- Open Krist wallet
- Log in
- Select Special TX
- Click "Double vault"
- Set a passcode(Not your KristWallet password ofc, also type slowly, there is no confirmation!)
- As amount put in all your KST
- Click Deposit
Now everytime you need to do a KST transaction:
-Open Krist wallet and log in
- Go to double vault
- Enter your passcode
- Enter the amount you need
- Click withdraw
- transfer the amount to the other krist address
With that technique you are save against a person like ry00000.
Edited by Luca_S, 24 January 2016 - 02:37 PM.
#1108
Posted 24 January 2016 - 03:06 PM
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
But these calculations are for a strong GPU cracker, good luck while doing this in CC.
ry00000, on 24 January 2016 - 02:26 PM, said:
#1109
Posted 24 January 2016 - 03:38 PM
bauen1, on 24 January 2016 - 03:06 PM, said:
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
But these calculations are for a strong GPU cracker, good luck while doing this in CC.
ry00000, on 24 January 2016 - 02:26 PM, said:
#1110
Posted 24 January 2016 - 03:39 PM
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
I'm not highly educated on the subject, however I'm aware that this only applies to a bruteforce cracker. If I understand correctly, you can crack such a password much faster using rainbow tables, especially if the password resembles actual words. I know this for a fact since my password of similar length was cracked before. Honestly, you don't even need to use a double vault. Just use a password made up of (seeded) randomly generated chars. Mine in particular is of length 32 and uses plaintext and non-plaintext characters, making it virtually impossible to crack.
#1111
Posted 24 January 2016 - 03:44 PM
Yevano, on 24 January 2016 - 03:39 PM, said:
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
I'm not highly educated on the subject, however I'm aware that this only applies to a bruteforce cracker. If I understand correctly, you can crack such a password much faster using rainbow tables, especially if the password resembles actual words. I know this for a fact since my password of similar length was cracked before. Honestly, you don't even need to use a double vault. Just use a password made up of (seeded) randomly generated chars. Mine in particular is of length 32 and uses plaintext and non-plaintext characters, making it virtually impossible to crack.
When I wrote KSTealer, I used a dictionary of common passwords, and also bruteforced all passwords up to 6 characters long. It netted me over 200k krist in the end, after about 3 days of cracking.
Edited by apemanzilla, 24 January 2016 - 03:45 PM.
#1112
Posted 24 January 2016 - 03:46 PM
we still have the same calculation, but instead of 1 billion we have 1/6th of a billion passwords per second, which gives us (8*10^17)/(8*10^9/6) , which means at least 6 times as much, so again GL cracking and thanks to bauen1 for telling me this.
apemanzilla, on 24 January 2016 - 03:44 PM, said:
Yevano, on 24 January 2016 - 03:39 PM, said:
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
I'm not highly educated on the subject, however I'm aware that this only applies to a bruteforce cracker. If I understand correctly, you can crack such a password much faster using rainbow tables, especially if the password resembles actual words. I know this for a fact since my password of similar length was cracked before. Honestly, you don't even need to use a double vault. Just use a password made up of (seeded) randomly generated chars. Mine in particular is of length 32 and uses plaintext and non-plaintext characters, making it virtually impossible to crack.
When I wrote KSTealer, I used a dictionary of common passwords, and also bruteforced all passwords up to 6 characters long. It netted me over 200k krist in the end, after about 3 days of cracking.
#1113
Posted 24 January 2016 - 03:48 PM
Luca_S, on 24 January 2016 - 03:46 PM, said:
we still have the same calculation, but instead of 1 billion we have 1/6th of a billion passwords per second, which gives us (8*10^17)/(8*10^9/6) , which means at least 6 times as much, so again GL cracking and thanks to bauen1 for telling me this.
apemanzilla, on 24 January 2016 - 03:44 PM, said:
Yevano, on 24 January 2016 - 03:39 PM, said:
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
I'm not highly educated on the subject, however I'm aware that this only applies to a bruteforce cracker. If I understand correctly, you can crack such a password much faster using rainbow tables, especially if the password resembles actual words. I know this for a fact since my password of similar length was cracked before. Honestly, you don't even need to use a double vault. Just use a password made up of (seeded) randomly generated chars. Mine in particular is of length 32 and uses plaintext and non-plaintext characters, making it virtually impossible to crack.
When I wrote KSTealer, I used a dictionary of common passwords, and also bruteforced all passwords up to 6 characters long. It netted me over 200k krist in the end, after about 3 days of cracking.
I didn't just bruteforce up to 6 characters, I also used a dictionary attack. The dictionary attack got the most.
#1114
Posted 24 January 2016 - 04:09 PM
apemanzilla, on 24 January 2016 - 03:48 PM, said:
I didn't just bruteforce up to 6 characters, I also used a dictionary attack. The dictionary attack got the most.
Edited by Luca_S, 24 January 2016 - 04:10 PM.
#1115
Posted 24 January 2016 - 04:14 PM
ry00000, on 24 January 2016 - 02:12 PM, said:
And yes, it requires cc.
ry00000, on 24 January 2016 - 02:26 PM, said:
I've ran out of CC options, so it's time for Visual Basic! I think there's an HTTP API for VB somewhere...
Luca_S, on 24 January 2016 - 03:38 PM, said:
bauen1, on 24 January 2016 - 03:06 PM, said:
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
But these calculations are for a strong GPU cracker, good luck while doing this in CC.
ry00000, on 24 January 2016 - 02:26 PM, said:
#1116
Posted 24 January 2016 - 04:24 PM
3d6, on 24 January 2016 - 04:14 PM, said:
ry00000, on 24 January 2016 - 02:12 PM, said:
And yes, it requires cc.
ry00000, on 24 January 2016 - 02:26 PM, said:
I've ran out of CC options, so it's time for Visual Basic! I think there's an HTTP API for VB somewhere...
Luca_S, on 24 January 2016 - 03:38 PM, said:
bauen1, on 24 January 2016 - 03:06 PM, said:
Luca_S, on 24 January 2016 - 02:30 PM, said:
- Capital and non capital letters
- And numbers
would have (2*26+10)^10 possibilities(62^10≈8*10^17), thats an 8 followed by 17 0's. Assuming you can do like 1 GH/s which means 1 billion passwords per second, we have (8*10^17)/(1*10^9)=8*10^8, which are 800000000 Seconds, now divide that by 24*60*60 and you get the days you will need to check every combination. That is about 9259 days and then you would've only got every 10 char password.
But these calculations are for a strong GPU cracker, good luck while doing this in CC.
ry00000, on 24 January 2016 - 02:26 PM, said:
By making v2 use an indeterminate amount of hashes, you've also inadvertently made it very inefficient to crack them with GPU acceleration.
#1117
Posted 24 January 2016 - 04:34 PM
#1120
2 user(s) are reading this topic
0 members, 2 guests, 0 anonymous users











