Tags: brute tth adc
you give the idea but not the scripts
@noraj the scripts here were the simplest thing (seriously, generate 4-byte permutations, save to file, run exe on this) and if you understood anything from this writeup then you would be able to write them yourself. Or should we also include a tutorial on how to run the script, because it might not be obvious for someone? Or a tutorial for downloading python interpreter? At which point you think it's safe to assume the reader can handle it?
Pharisaeus, excuse me, at what point was it revealed that the line had a trailing \n? It seems I missed it somehow so I was dumbfounded when no 5-letter alphanumeric combination worked.
The search for a working TTH implementation was a real challenge here to be honest, barely anything worked correctly :) Somehow even test Tiger empty file hashes found online turned out to be different for at least three implementations, so I ended up using basically rhash.
Felt like TTH is not documented much. I confused between TTH(Tiger Tree Hash) and the Tiger message digests for most part of the time. Only later did I realize that tiger encryption is used as a part in calculating TTH.