mersenneforum.org  

Go Back   mersenneforum.org > Factoring Projects > Msieve

Reply
 
Thread Tools
Old 2016-01-02, 20:35   #78
wombatman
I moo ablest echo power!
 
wombatman's Avatar
 
May 2013

29×61 Posts
Default

http://factordb.com/index.php?id=1100000000812101796

Looks like it should be able to factor pretty quickly. I'll take care of it.
wombatman is online now   Reply With Quote
Old 2016-01-02, 21:13   #79
darkskysofrenia
 
Jan 2016

A16 Posts
Default

done :



but ... unfactor.py still (https://github.com/Googulator/TeslaCrack) no output :(
darkskysofrenia is offline   Reply With Quote
Old 2016-01-02, 21:15   #80
wombatman
I moo ablest echo power!
 
wombatman's Avatar
 
May 2013

29×61 Posts
Default

Sorry, you'll have to ask Googulator about that
wombatman is online now   Reply With Quote
Old 2016-01-03, 03:13   #81
hlopezdp
 
Dec 2015

5 Posts
Default

Quote:
Originally Posted by darkskysofrenia View Post
done :



but ... unfactor.py still (https://github.com/Googulator/TeslaCrack) no output :(
Try using unfactor-ecdsa.py (remember to install python-ecdsa module). I never got output from unfactor.py :(

---

About Googulator's C134, it seems that somebody got it: http://factordb.com/index.php?id=1100000000811939811 so I'm going to stop YAFU in my server. (Yes, it is still sieving since then)
hlopezdp is offline   Reply With Quote
Old 2016-01-03, 04:59   #82
jux
 
jux's Avatar
 
Aug 2015

2·33 Posts
Default

Quote:
Originally Posted by dearnizam View Post
Hi Jux,

Thanks alot for help and your factor number has helped me to recover my files of D drive and when i tried to recover files of C drive this is coming with different public key.

Im trying to get factor for this.

Im very much thankfull to Wombatman,Jux and all the members of this group.

Regards
Nizamuddin
You're welcome! If you (or anyone) have any other numbers you need factoring, I would be happy to help. I don't have that powerful hardware but I can still get some results.
jux is offline   Reply With Quote
Old 2016-01-03, 09:08   #83
dearnizam
 
Dec 2015

128 Posts
Smile

Hi Wombatman,

I was successfully recovered my other drive (C) also.
Thank you once again for all the members of this forum.

Regards
Nizamuddin
dearnizam is offline   Reply With Quote
Old 2016-01-03, 10:15   #84
darkskysofrenia
 
Jan 2016

2×5 Posts
Default

effectively unfactor-ecdsa works on that one, it's output one key. I do that for a friend , it's the second computer i restore files , on the first one unfactor.py works good it's output me 3 or 4 keys.
darkskysofrenia is offline   Reply With Quote
Old 2016-01-03, 15:02   #85
wombatman
I moo ablest echo power!
 
wombatman's Avatar
 
May 2013

29·61 Posts
Default

Quote:
Originally Posted by dearnizam View Post
Hi Wombatman,

I was successfully recovered my other drive (C) also.
Thank you once again for all the members of this forum.

Regards
Nizamuddin
Hooray! Glad everything worked out!
wombatman is online now   Reply With Quote
Old 2016-01-04, 14:26   #86
Googulator
 
Dec 2015

2010 Posts
Default

Unfactor.py only works by default with pdf files, anything else requires changing the file magic number in the script.
Googulator is offline   Reply With Quote
Old 2016-01-04, 15:41   #87
munozbasols
 
Jan 2016

22 Posts
Default

Quote:
Originally Posted by Googulator View Post
Unfactor.py only works by default with pdf files, anything else requires changing the file magic number in the script.
Hi I tried for my infection your method but not works por pdf files.

Maybe i'm doing something wrong.

My file:
https://drive.google.com/open?id=0Bw...Td1dlRHVlVaUFk


1ºDone:
Run: python teslacrack.py .

10ACCB6406EB1FE0D93DCC2C5BBDACD8710A04DEB15520EEF1D4CFEDC2DFCA3895943154618918FE62DA23B722D5809C7AE170584FA8BE30267C1FAF516A5D40
found in ./PRENSA2.pdf.vvv
Alternatively, you can crack the following Bitcoin key(s) using msieve, and use
them with TeslaDecoder:
5A418C2F6DD510539255FDDFF6EA230CCBA15B0D044B400BFEBE9DE5B1D663F645BF81EEAFC8A51936947065D4DAACFB5EA0B7BC1B5ED6B17002C95DF69121A1
found in ./PRENSA2.pdfvvv

converto to decimal
Now factorizing....

2 2 2 2 2 2 3 5 5 5 29 59 103 151 2081 2039603 32217360122481615502589045613479955474752095446678609241111273219104696661995602407892730

Once factorized it run ecdsa
Run python unfactor-ecdsa.py



And shows no aes encryption key found :(

I'm doing something wrong?
munozbasols is offline   Reply With Quote
Old 2016-01-04, 16:47   #88
munozbasols
 
Jan 2016

22 Posts
Default

Quote:
Originally Posted by Googulator View Post
Unfactor.py only works by default with pdf files, anything else requires changing the file magic number in the script.
I not works for me :( could you make a video :) please
munozbasols is offline   Reply With Quote
Reply



Similar Threads
Thread Thread Starter Forum Replies Last Post
Using msieve with c burrobert Msieve 9 2012-10-26 22:46
Yes: Tales from Typographic Oceans xilman Lounge 79 2012-05-26 23:53
msieve help em99010pepe Msieve 23 2009-09-27 16:13
95% sure I have a virus, please help jasong Hardware 8 2006-11-19 22:57
virus hardware damage? TTn Hardware 18 2006-11-04 09:41

All times are UTC. The time now is 01:21.


Sat Jul 17 01:21:46 UTC 2021 up 49 days, 23:09, 1 user, load averages: 1.09, 1.12, 1.22

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.