![]() |
|
|
#78 |
|
I moo ablest echo power!
May 2013
29×61 Posts |
http://factordb.com/index.php?id=1100000000812101796
Looks like it should be able to factor pretty quickly. I'll take care of it. |
|
|
|
|
|
#79 |
|
Jan 2016
A16 Posts |
|
|
|
|
|
|
#80 |
|
I moo ablest echo power!
May 2013
29×61 Posts |
Sorry, you'll have to ask Googulator about that
|
|
|
|
|
|
#81 | |
|
Dec 2015
5 Posts |
Quote:
--- About Googulator's C134, it seems that somebody got it: http://factordb.com/index.php?id=1100000000811939811 so I'm going to stop YAFU in my server. (Yes, it is still sieving since then) |
|
|
|
|
|
|
#82 | |
|
Aug 2015
2·33 Posts |
Quote:
|
|
|
|
|
|
|
#83 |
|
Dec 2015
128 Posts |
Hi Wombatman,
I was successfully recovered my other drive (C) also. Thank you once again for all the members of this forum. Regards Nizamuddin |
|
|
|
|
|
#84 |
|
Jan 2016
2×5 Posts |
effectively unfactor-ecdsa works on that one, it's output one key. I do that for a friend , it's the second computer i restore files , on the first one unfactor.py works good it's output me 3 or 4 keys.
|
|
|
|
|
|
#85 |
|
I moo ablest echo power!
May 2013
29·61 Posts |
|
|
|
|
|
|
#86 |
|
Dec 2015
2010 Posts |
Unfactor.py only works by default with pdf files, anything else requires changing the file magic number in the script.
|
|
|
|
|
|
#87 | |
|
Jan 2016
22 Posts |
Quote:
Maybe i'm doing something wrong. My file: https://drive.google.com/open?id=0Bw...Td1dlRHVlVaUFk 1ºDone: Run: python teslacrack.py . 10ACCB6406EB1FE0D93DCC2C5BBDACD8710A04DEB15520EEF1D4CFEDC2DFCA3895943154618918FE62DA23B722D5809C7AE170584FA8BE30267C1FAF516A5D40 found in ./PRENSA2.pdf.vvv Alternatively, you can crack the following Bitcoin key(s) using msieve, and use them with TeslaDecoder: 5A418C2F6DD510539255FDDFF6EA230CCBA15B0D044B400BFEBE9DE5B1D663F645BF81EEAFC8A51936947065D4DAACFB5EA0B7BC1B5ED6B17002C95DF69121A1 found in ./PRENSA2.pdfvvv converto to decimal Now factorizing.... 2 2 2 2 2 2 3 5 5 5 29 59 103 151 2081 2039603 32217360122481615502589045613479955474752095446678609241111273219104696661995602407892730 Once factorized it run ecdsa Run python unfactor-ecdsa.py And shows no aes encryption key found :( I'm doing something wrong? |
|
|
|
|
|
|
#88 |
|
Jan 2016
22 Posts |
|
|
|
|
![]() |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| Using msieve with c | burrobert | Msieve | 9 | 2012-10-26 22:46 |
| Yes: Tales from Typographic Oceans | xilman | Lounge | 79 | 2012-05-26 23:53 |
| msieve help | em99010pepe | Msieve | 23 | 2009-09-27 16:13 |
| 95% sure I have a virus, please help | jasong | Hardware | 8 | 2006-11-19 22:57 |
| virus hardware damage? | TTn | Hardware | 18 | 2006-11-04 09:41 |