Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: AES Encryption
Post: RE: AES Encryption
Thanks for this reply.
I build in your suggestion.
So the key gets now generated, using the system-dependent information AND an user-key, with PBKDF2 with 10000 rounds of salted SHA512.
I still in... |
|
TrAnn3l |
General Talk
|
2 |
7,028 |
07-31-2014, 01:17 PM |
|
|
Thread: AES Encryption
Post: AES Encryption
Hello Guys,
your crypto-knowledge is wanted :D
At the moment i'm coding a program which should be able to keep the passwords of the users. Of course i don't want to save them in plain text, so i... |
|
TrAnn3l |
General Talk
|
2 |
7,028 |
07-29-2014, 09:02 PM |
|
|
Thread: Need help with redmine hashes
Post: RE: Need help with redmine hashes
I don't know which hashtype you want to crack, but i can say you, that -m 7600 doesn't exists.
Look here and search for your hashtype : https://hashcat.net/wiki/doku.php?id=example_hashes |
|
TrAnn3l |
Old hashcat Support
|
6 |
12,419 |
02-05-2014, 04:42 PM |
|
|
Thread: Strange Mask Attack Ouput
Post: RE: Strange Mask Attack Ouput
Okay, that makes sense, thanks for this fast answer :) |
|
TrAnn3l |
Very old oclHashcat-plus Support
|
2 |
6,116 |
11-11-2013, 06:09 PM |
|
|
Thread: Strange Mask Attack Ouput
Post: Strange Mask Attack Ouput
Today i tryied to crack some ip's so i made a mask which runs trough all possibel ip's.
But i get another output as the mask should deliver.
Here is the example:
pw(MD5):14040393.18
Mask that crac... |
|
TrAnn3l |
Very old oclHashcat-plus Support
|
2 |
6,116 |
11-11-2013, 04:01 PM |
|
|
Thread: Password Analyzer by TrAnn3l
Post: Password Analyzer by TrAnn3l
Hey together,
I am proud to present you my Password Analyzer :)
https://img854.imageshack.us/img854/2240/uk7n.png
It generate masks out of your password-file and generates, if you want to, a small st... |
|
TrAnn3l |
User Contributions
|
1 |
8,071 |
11-06-2013, 05:46 PM |
|
|
Thread: wpa Brute-force (only 8 char number)
Post: RE: wpa Brute-force (only 8 char number)
if you only want 8 chars, you can also leave the increment
and because your path has no spaces, you can leave the quotes, so yor code should look like:
PHP Code:
--
cudaHashcat-plus64.exe -a 3 -... |
|
TrAnn3l |
Very old oclHashcat-plus Support
|
3 |
13,384 |
10-28-2013, 10:38 PM |
|
|
Thread: Searching very big word list
Post: RE: Searching very big word list
If you want to bruteforce all letters and numbers ( including uppercase) you have to use
-1 ?l?u?d ?1?1?1?1?1?1?1?1 |
|
TrAnn3l |
General Help
|
4 |
8,648 |
05-23-2013, 08:12 PM |
|
|
Thread: oclHashCat-plus64 MD5(unix) cracking help
Post: RE: oclHashCat-plus64 MD5(unix) cracking help
If you only want to crack one hash, you should use cudaHashcat-lite, that is much faster than normal cudaHashcat-plus, but you can only crack one hash at time. Also, if you want to crack a 4 length pa... |
|
TrAnn3l |
General Talk
|
19 |
54,070 |
05-02-2013, 04:55 PM |
|
|
Thread: oclHashCat-plus64 MD5(unix) cracking help
Post: RE: oclHashCat-plus64 MD5(unix) cracking help
And what is the default built-in mask? |
|
TrAnn3l |
General Talk
|
19 |
54,070 |
05-01-2013, 11:00 PM |
|
|
Thread: oclHashCat-plus64 MD5(unix) cracking help
Post: RE: oclHashCat-plus64 MD5(unix) cracking help
I tried the same hash you had, didn't crack it too, but then i tried it with a other command.
i cracked the hash, using
Code:
--
oclHashcat-plus64.exe -a 3 "hash.txt" ?a?a?a?a?a?a
--
well, i think... |
|
TrAnn3l |
General Talk
|
19 |
54,070 |
05-01-2013, 10:07 PM |
|
|
Thread: oclHashCat-plus64 MD5(unix) cracking help
Post: RE: oclHashCat-plus64 MD5(unix) cracking help
np, i you check the -h option of hashcat like
cudaHashcat-plus64.exe -h
you will get many useful information ;) |
|
TrAnn3l |
General Talk
|
19 |
54,070 |
05-01-2013, 08:07 PM |
|
|
Thread: oclHashCat-plus64 MD5(unix) cracking help
Post: RE: oclHashCat-plus64 MD5(unix) cracking help
To crack all possible combinations just use:
cudaHashcat-plus64.exe -m 500 -a 3 -i --increment-max 6
that bruteforces all possible combination with ?u?l?s?d with a max. lenght of 6 chars. |
|
TrAnn3l |
General Talk
|
19 |
54,070 |
05-01-2013, 06:52 PM |
|
|
Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos
ok, nice to know.
I tried that already, i still get blank lines. |
|
TrAnn3l |
General Talk
|
8 |
14,735 |
04-30-2013, 07:59 PM |
|
|
Thread: All Chars = Big Chaos
Post: All Chars = Big Chaos
I just wanted to crack every possible hash, so i mkade my self a charset, which contains all chars in hex, and used it in bruteforce mode in oclHashcat. I was surprised, because it looks like ther wou... |
|
TrAnn3l |
General Talk
|
8 |
14,735 |
04-30-2013, 07:27 PM |
|
|
Thread: [oclHashcat-plus] Multiple Dicts in Hybrid Attack
Post: [oclHashcat-plus] Multiple Dicts in Hybrid Attack
Hello, i wanted to ask if it's possible, to add multiple dictionary support to oclhashcat-plus while using hybrid attack.
Thanks for reading ;) |
|
TrAnn3l |
Feature Requests
|
1 |
15,314 |
02-16-2013, 05:01 PM |