Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...
For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often. |
|
Incisive |
Old oclHashcat Support
|
9 |
34,149 |
07-22-2014, 05:25 AM |
|
|
Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...
It's still using the 0x200 identifier; I just double-checked. |
|
Incisive |
General Talk
|
3 |
9,880 |
04-07-2014, 04:23 AM |
|
|
Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...
If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes.
The archived thread on SQL Server 2012 hashes is at:
https://hashcat.net/foru... |
|
Incisive |
General Talk
|
3 |
9,880 |
04-04-2014, 04:12 PM |
|
|
Thread: Workstation GPU support (NVIDIA Quadro, ATI FirePro)
Post: Workstation GPU support (NVIDIA Quadro, ATI FirePr...
I realize it's suboptimal, but work password auditing must be done on work supplied hardware, unfortunately - compliance with corporate standards trumps speed. As long as I can get similar or faster ... |
|
Incisive |
Hardware
|
0 |
4,512 |
02-20-2014, 07:42 PM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Thank you for the reminder; I need to look that up! |
|
Incisive |
Old oclHashcat Support
|
4 |
18,271 |
01-27-2014, 06:12 AM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO... |
|
Incisive |
Old oclHashcat Support
|
4 |
18,271 |
01-24-2014, 10:08 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT.
For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u... |
|
Incisive |
General Talk
|
6 |
12,451 |
01-24-2014, 09:50 PM |
|
|
Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)
First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI!
I'd like to suggest that once you're happy with the ... |
|
Incisive |
General Talk
|
10 |
25,564 |
10-10-2013, 05:28 AM |
|
|
Thread: Why closed source?
Post: RE: Why closed source?
Personally, I would like to thank Atom and all the other contributors to Hashcat for continuing to offer it to the security community for free. That, in and of itself, is both very generous, and very... |
|
Incisive |
General Talk
|
29 |
65,442 |
10-10-2013, 05:04 AM |
|
|
Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos
You can use
Code:
--
--outfile=Myfile.out --outfile-format=5
--
instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's... |
|
Incisive |
General Talk
|
8 |
14,728 |
05-03-2013, 04:26 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,927 |
04-19-2013, 12:32 PM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Mem5 Wrote: (04-19-2013, 07:51 AM)
--
Ok, I'll open a TRAC. Thank you for your help.
Curious question : how can somebody login into a system using a password with the null byte character ? As it i... |
|
Incisive |
General Help
|
15 |
33,294 |
04-19-2013, 12:02 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,927 |
04-18-2013, 04:30 AM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
First, let me say that this has been a great discussion, and I'd like to thank Atom for the choice to branch out into some of the more interesting formats that aren't pure hashes!
Second, regarding... |
|
Incisive |
Very old oclHashcat-plus Support
|
44 |
361,999 |
04-18-2013, 04:28 AM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...
I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes.
Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,927 |
04-17-2013, 05:10 AM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
jpgoldberg Wrote: (04-17-2013, 02:44 AM)
--
Remember that unlike the passwords that 1Password saves for people, the Master Password has to be memorable and typable by humans. If one uses a diceware p... |
|
Incisive |
Very old oclHashcat-plus Support
|
44 |
361,999 |
04-17-2013, 04:58 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Awesome job, philsmd!!!
Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:... |
|
Incisive |
General Help
|
15 |
33,294 |
04-15-2013, 06:12 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe... |
|
Incisive |
General Help
|
15 |
33,294 |
04-14-2013, 05:37 AM |
|
|
Thread: Markov stats questions
Post: Markov stats questions
First, thank you for implementing Markov mode - even the default oclhashcat-plus 0.14 implementation gets may more hits in the first part of the keyspace than in the last.
I have a few questions ab... |
|
Incisive |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
7,489 |
04-10-2013, 03:33 PM |
|
|
Thread: status from gpu cracking?
Post: RE: status from gpu cracking?
First, you may be confusing the "lite" version with the "plus" version.
lite is designed to operate on a single hash, fed in on the command line.
plus is designed to operate on a file of hashes.
He... |
|
Incisive |
Very old oclHashcat-plus Support
|
8 |
18,261 |
04-05-2013, 01:10 AM |