Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?

@epixoip (https://hashcat.net/forum/user-1746.html):: Single rules (-j, -k) do work with -a1.
M@LIK General Help 12 22,994 10-22-2012, 11:17 AM
    Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09

Yes, it's missing a dict.
M@LIK Very old oclHashcat-plus Support 4 9,623 10-22-2012, 12:08 AM
    Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?

-plus's -a1 always works with two dicts (Right and left). And yes, it was brought back due to a request: https://hashcat.net/forum/thread-1335.html But careful, CPU's hashcat works with one dict a...
M@LIK General Help 12 22,994 10-22-2012, 12:02 AM
    Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?

If you want to make "Sup3rThinkers" out of "sup3r" in dict1 and "thinkers" in dict2, you would run: Code: -- -plus ... -a1 -j u -k u ... dict1 dict2 -- But you can't do it that simple with CPU's hash...
M@LIK General Help 12 22,994 10-21-2012, 10:35 PM
    Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?

CPU's hashcat apply rules to the whole candidate, not separately.
M@LIK General Help 12 22,994 10-21-2012, 09:14 PM
    Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?

I'm not sure, but I believe It's: Code: -- -j, --rule-left=RULE Single rule applied to each word from left dict -k, --rule-right=RULE Single rule applied to each word f...
M@LIK General Help 12 22,994 10-21-2012, 09:12 PM
    Thread: dictionary maker?
Post: RE: dictionary maker?

I assume you suffer from a brain damage so: Code: -- mp64 -1 ?l?d -o outputfile ?1?1?1?1?1?1 --
M@LIK General Help 7 13,278 10-20-2012, 03:32 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do: Code: -- perl CiscoASA.pl < usernames -- CiscoASA.pl: Code: -...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-19-2012, 06:07 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Then -a7 is the way to go! It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below: C...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-19-2012, 05:49 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Yes, I will be lying if I said I didn't think about that. Indeed, maskprocessor's performance is nowhere around GPU's performance. You can also make a file with all chopped usernames, analyze them...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 09:06 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules. Code: -- mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile -- This above will brute-...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 06:21 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

That's what I was exactly writing you, see below. It's not very professional, but you can get away with rules or multi-rules. Make a rule-file with all first four bytes of the usernames, you can...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 05:34 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

As far as I know, Cisco-PIX MD5 hashing doesn't involve any salting.
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 04:36 PM
    Thread: Oracle 11g Format
Post: RE: Oracle 11g Format

I guess that's not an Oracle 11g hash. Probably Oracle 7-10g. Try -m3100, the correct format is HASH:USERNAME where hash is the 16 hex characters. Code: -- CE4A36B8E06CA59C:*** --
M@LIK Very old oclHashcat-plus Support 12 27,484 10-17-2012, 03:43 PM
    Thread: Passwords^12 - program & registration
Post: RE: Passwords^12 - program & registration

That's great news for me as well. Thanks!
M@LIK Organisation and Events 9 20,083 10-16-2012, 12:14 AM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Good! And yes, that's one way to use the sed command. I just wrote you the command you can utilize it in many ways. Just to make sure everything is going in the right way, try cracking a known h...
M@LIK Very old oclHashcat-plus Support 8 27,311 10-16-2012, 12:10 AM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Yes, just stack them in your command line: Code: -- ... dict1.txt dict2.txt dict3.txt -- Easy as that.
M@LIK Very old oclHashcat-plus Support 8 27,311 10-15-2012, 11:40 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

SnakeEye Wrote: -- I actually tried removing first 9 chars and using a online decrypter which did not work :-) -- Negative. Salted hashes can not be cracked using online DBs. SnakeEye Wrote: -- C...
M@LIK Very old oclHashcat-plus Support 8 27,311 10-15-2012, 10:31 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Simple. 1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat: Code: -- sed "s#^\(.\{9\}\)\(.\{40\}\...
M@LIK Very old oclHashcat-plus Support 8 27,311 10-15-2012, 09:58 PM
    Thread: hashcat-lite 0.8+ AMD 7970 Work?
Post: RE: hashcat-lite + AMD 7970 Work?

-lite is oclHashcat-lite-0.10 (https://hashcat.net/oclhashcat-lite/) now!
M@LIK Hardware 4 8,947 10-09-2012, 07:15 PM