Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: ATTENTION! OpenCL kernel self-test failed.
Post: RE: ATTENTION! OpenCL kernel self-test failed.
@ philsmd
latest tests of 22000 - WPA-PBKDF2-PMKID+EAPOL are very impressive. 2200x offers many advantages. |
|
ZerBea |
hashcat
|
31 |
12,818 |
12-22-2019, 12:44 PM |
|
|
Thread: CUDA Installation not detected
Post: RE: CUDA Installation not detected
I can confirm this issue also on Linux, running latest driver 430.40 in combination with a MSI 1050 TI AERO:
5.2.7-arch1-1-ARCH
cuda 10.1.168
nvidia 430.40-2
nvidia-settings 430.40-3
nvidia-utils... |
|
ZerBea |
Beta Tester
|
7 |
12,889 |
08-10-2019, 01:51 PM |
|
|
Thread: Epic cracking!
Post: RE: Epic cracking!
Helped me to get a high hitrate:
https://en.wikipedia.org/wiki/Intelligence_cycle
Cheers |
|
ZerBea |
hashcat
|
17 |
13,901 |
08-04-2017, 08:32 AM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
Upload the cap here:
https://wpa-sec.stanev.org/?nets |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,098 |
05-18-2018, 05:56 PM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
...or simple use hcxtools for capturing and conversion, as they provide nonce-error-corrections and more...
BTW:
hcxtools running in background of wpa-sec and they did the conversion! |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,098 |
05-19-2018, 09:15 AM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
Hi kexec.
That is a typical aircrack capture. You captured 125954 packets (3.949.735 Bytes) for only one unauthorized handshake (tons of useless frames inside).
$ hcxpcaptool -o test.hccapx -E wordl... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,098 |
05-22-2018, 09:45 AM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
Hi kexec.
I see that you successfully converted it to hccapx using hcxpcaptool, so it is a bug in hashcat's cap2hccapx?
hcxpcaptool is completely different to other tools, so it will convert your... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,098 |
05-23-2018, 08:14 PM |
|
|
Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx
So the problem is that if cap contains a lot of garbage packets, cap2hccapx cant convert it? How to determine which packets are not needed and I can delete them from .cap file?
You can do a cleaning ... |
|
ZerBea |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
10 |
14,098 |
05-23-2018, 10:27 PM |
|
|
Thread: convert a WPA / WPA2 pcap
Post: RE: convert a WPA / WPA2 pcap
the file name looks like you use a stupid script to capture and prepare wifi traffic!
please read this:
https://hashcat.net/forum/thread-6666-post-35540.html#pid35540 |
|
ZerBea |
General Talk
|
9 |
15,385 |
10-11-2017, 07:41 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Also a good idea is to read the RFC docs , even if they are not easy to understand. They are our basic docs if we add new functions to our tools:
https://tools.ietf.org/html/rfcXXXX
where XXXX is t... |
|
ZerBea |
hashcat
|
21 |
17,277 |
02-13-2018, 03:49 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
I do not want capture this thread, but I have a question:
Do you have some informations about (free)RADIUS, specifically about the packet structure of the Attribute Value Pairs in the Access-Request ... |
|
ZerBea |
hashcat
|
21 |
17,277 |
02-11-2018, 02:05 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
We are talking about different things.
You can crack a RADIUS password with hashmode -m 4800 (CHAP). But that's only one single variant.
For example: sometimes the password is stored as BASE64(SHA1(... |
|
ZerBea |
hashcat
|
21 |
17,277 |
02-12-2018, 09:34 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
here:
https://github.com/ZerBea/hcxkeys |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-02-2018, 06:33 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
Maybe you're doing something wrong:
$ time wlangenpmkocl -e networkname -i rockyou -A pmklist
using: GeForce GTX 1080 Ti
9612471 plainmasterkeys generated, 4734589 password(s) skipped
real 0m4... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-03-2018, 07:07 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
Well, that's easy to explain:
Both modes 2501 and 12000 designed are for analysts who work on large hashfiles.
You captured a network with the same ESSID.
Time for calculation of the PMK list ... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-05-2018, 10:46 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
No problem, you're welcome.
If you are an analyst (coding-, crypto-, weak point analysis), or a penetration tester, or if you use a huge database (wpa-sec) 2501 /12000 is your mode.
If not, there is... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-05-2018, 11:26 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
The simplest way:
hashcat -m 2501 test.hccapx pmklist
But it doesn't make sense for you, if you are not an analyst! |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-17-2018, 04:00 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
wlangenpmkocl is the choice to precalculate PMKs for hashcat:
$ wlangenpmkocl -h
wlangenpmkocl 4.0.1 (C) 2018 ZeroBeat
usage: wlangenpmkocl
options:
-e : input single essid (networkname:... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-02-2018, 02:23 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
wlangenpmkocl use only one GPU each task. If you have 2 GPUs, you can calculate 2 different(!) PMK lists at the same time (or two parts of the same list - you need to split your word list into 2 parts... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-04-2018, 07:30 PM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
And Again: If you think, 2501 is slow, you're doing something really, really wrong:
Session..........: hashcat
Status...........: Running
Hash.Type........: WPA/WPA2 PMK
Hash.Target......: archi... |
|
ZerBea |
General Talk
|
20 |
19,682 |
03-05-2018, 11:02 AM |