Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: oclHashcat-plus --show question
Post: RE: oclHashcat-plus --show question
@atom (https://hashcat.net/forum/user-1.html):: Yes! you are right, it's working for me.
I didn't know you have to set "-m" when using "--show".
And yeah, bytes not bits -__-
Too much ****. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,597 |
05-16-2012, 12:22 PM |
|
|
Thread: bug in 0.40b4
Post: RE: bug in 0.40b4
Yup, I noticed something similar in v0.39. |
|
M@LIK |
Old hashcat Support
|
3 |
6,939 |
05-16-2012, 12:08 PM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Then, I'm sorry I don't know what's wrong there. |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,288 |
05-16-2012, 01:06 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Ahh, yes... you gave two different salts -__-
Anyway, the hashes you provide are correct cracks:
Code:
--
d59be66565eeb562bb2b724d71b8a4e3:S$~!!:omgwtf
f179e7768678b3c5daa920bbfc75cffd:Fu~!!:474... |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,288 |
05-16-2012, 12:55 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Are you sure?
Cause I generated the hash for "omgwtf" and here's what I found:
Code:
--
7f8f65c062e3a9536fad48fead0af65a:S$~./
--
7f8f65c062e3a9536fad48fead0af65a: S$~./:omgwtf
2811 = IPB2+, MyB... |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,288 |
05-16-2012, 12:27 AM |
|
|
Thread: restore file
Post: RE: restore file
|
M@LIK |
Feature Requests
|
2 |
9,404 |
05-15-2012, 05:53 PM |
|
|
Thread: oclHashcat-plus --show question
Post: RE: Bruteforce LM
@Mem5 (https://hashcat.net/forum/user-513.html):: Hashcat deals with LM hashes as chunks (16-bit hashes):
1- --remove doesn't work with LMs.
2- I just noticed this, --show doesn't work too! whatever ... |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,597 |
05-15-2012, 01:53 PM |
|
|
Thread: Large IPB list issue
Post: RE: Large IPB list issue
I think now I know what I was doing wrong:
Code:
--
Status.......: Running
Input.Mode...: ______
Hash.Target..: ______
Hash.Type....: IPB2+, MyBB1.2+
Time.Running.: 7 mins, 6 secs
Time.Left..... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
38,222 |
05-13-2012, 09:33 PM |
|
|
Thread: Configuration for speed up ocl ?
Post: RE: Configuration for speed up ocl ?
@Mem5 (https://hashcat.net/forum/user-513.html):: I would suggest you to increase "-n" when brute-forcing, decrease when dicting (Dictionary attack) xD.
And lower "--gpu-loops" when attacking slow-as-... |
|
M@LIK |
General Help
|
7 |
16,275 |
05-13-2012, 07:08 PM |
|
|
Thread: Bruteforce LM
Post: RE: Bruteforce LM
@phillips321 (https://hashcat.net/forum/user-1734.html):: What you want is called Increment Brute Force (https://hashcat.net/forum/thread-855.html).
It's not supported yet, but: Give it your vote!
h... |
|
M@LIK |
General Help
|
3 |
10,081 |
05-13-2012, 06:31 PM |
|
|
Thread: hash file limit?
Post: RE: hash file limit?
From Home page (https://hashcat.net/oclhashcat-plus/):
Code:
--
Multi-Hash (up to 24 million hashes)
--
I tried loading 15M, It did work.
And I also highly doubt they're all MD5s. |
|
M@LIK |
Very old oclHashcat-plus Support
|
2 |
5,878 |
05-12-2012, 09:49 AM |
|
|
Thread: random gen
Post: RE: random gen
@restrictedbytes (/forum/user-1158.html):: Yes, you are right, he made a mistake with the mask.
But, what was more important is he wanted to generate random strings, and the mask thing was just an at... |
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
9,823 |
05-11-2012, 11:56 PM |
|
|
Thread: random gen
Post: RE: random gen
Gosh, Too many people have the same problems as mine, but I only solve them.
Just joking. : P
I discussed this here: https://hashcat.net/forum/thread-1107.html
Post:#10 is the "light". LOL
... |
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
9,823 |
05-11-2012, 09:25 PM |
|
|
Thread: New rule
Post: RE: New rule
+1 if it does what I think it does.
The new rule is ( a ):
Code:
--
cat wordlist
pass1
123pass
p4ss
66killsin1
cat rule
a $1
a $s
hc wordlist -r rule --stdout
pass1
pass1
p4ss
kil... |
|
M@LIK |
Feature Requests
|
5 |
10,957 |
05-09-2012, 07:23 PM |
|
|
Thread: oclHashcat-plus v0.09 Poll 1/3: Next major feature
Post: RE: oclHashcat-plus v0.09 Poll 1/3: Next major fea...
I want to see:
Code:
--
42f45c9ac679d7a39d7ac97e4f64e38b:This Password has about 70 charcters, Too long? No problem. HASHCAT is here!
Status.......: Cracked
Hash.Target..: 42f45c9ac679d7a39d7ac9... |
|
M@LIK |
Organisation and Events
|
23 |
55,342 |
05-09-2012, 04:19 PM |
|
|
Thread: oclHashcat-plus v0.09 Poll 3/3: Next algorithms
Post: RE: oclHashcat-plus v0.09 Poll 3/3: Next algorithm...
TrueCrypt!!
https://screenshots.en.sftcdn.net/en/scrn/68000/68775/truecrypt-21.jpg |
|
M@LIK |
Organisation and Events
|
15 |
35,522 |
05-09-2012, 04:01 PM |
|
|
Thread: oclHashcat-plus v0.081 *HOTFIX*
Post: RE: oclHashcat-plus v0.081 *HOTFIX*
I don't need this.
But thanks for the efforts! |
|
M@LIK |
Very old oclHashcat-plus Announcements
|
5 |
19,044 |
05-08-2012, 11:47 AM |
|
|
Thread: MD5 Crack with Salt
Post: RE: MD5 Crack with Salt
|
M@LIK |
Old hashcat Support
|
9 |
59,388 |
05-07-2012, 05:11 PM |
|
|
Thread: SHA-256($salt.$pass)
Post: RE: SHA-256($salt.$pass)
|
M@LIK |
Feature Requests
|
9 |
26,014 |
05-06-2012, 06:41 PM |
|
|
Thread: mp64: generate total random words
Post: RE: mp64: generate total random words
Indeed.
I think you should (specially if it was faster).
I find this useful when crazy bruteforces are needed like (?d?l?u=12, ?d=16, etc)
You can generate 5\10GiGs and try them, and get around 2% ... |
|
M@LIK |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
20 |
42,461 |
05-06-2012, 04:04 PM |