Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
@epixoip (https://hashcat.net/forum/user-1746.html):: Single rules (-j, -k) do work with -a1. |
|
M@LIK |
General Help
|
12 |
22,994 |
10-22-2012, 11:17 AM |
|
|
Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09
Yes, it's missing a dict. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
9,623 |
10-22-2012, 12:08 AM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
-plus's -a1 always works with two dicts (Right and left).
And yes, it was brought back due to a request: https://hashcat.net/forum/thread-1335.html
But careful, CPU's hashcat works with one dict a... |
|
M@LIK |
General Help
|
12 |
22,994 |
10-22-2012, 12:02 AM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
If you want to make "Sup3rThinkers" out of "sup3r" in dict1 and "thinkers" in dict2, you would run:
Code:
--
-plus ... -a1 -j u -k u ... dict1 dict2
--
But you can't do it that simple with CPU's hash... |
|
M@LIK |
General Help
|
12 |
22,994 |
10-21-2012, 10:35 PM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
CPU's hashcat apply rules to the whole candidate, not separately. |
|
M@LIK |
General Help
|
12 |
22,994 |
10-21-2012, 09:14 PM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
I'm not sure, but I believe It's:
Code:
--
-j, --rule-left=RULE Single rule applied to each word from left dict
-k, --rule-right=RULE Single rule applied to each word f... |
|
M@LIK |
General Help
|
12 |
22,994 |
10-21-2012, 09:12 PM |
|
|
Thread: dictionary maker?
Post: RE: dictionary maker?
I assume you suffer from a brain damage so:
Code:
--
mp64 -1 ?l?d -o outputfile ?1?1?1?1?1?1
--
|
|
M@LIK |
General Help
|
7 |
13,278 |
10-20-2012, 03:32 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do:
Code:
--
perl CiscoASA.pl < usernames
--
CiscoASA.pl:
Code:
-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 06:07 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Then -a7 is the way to go!
It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below:
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 05:49 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Yes, I will be lying if I said I didn't think about that.
Indeed, maskprocessor's performance is nowhere around GPU's performance.
You can also make a file with all chopped usernames, analyze them... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 09:06 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules.
Code:
--
mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile
--
This above will brute-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 06:21 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
That's what I was exactly writing you, see below.
It's not very professional, but you can get away with rules or multi-rules.
Make a rule-file with all first four bytes of the usernames, you can... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 05:34 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
As far as I know, Cisco-PIX MD5 hashing doesn't involve any salting. |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 04:36 PM |
|
|
Thread: Oracle 11g Format
Post: RE: Oracle 11g Format
I guess that's not an Oracle 11g hash. Probably Oracle 7-10g.
Try -m3100, the correct format is HASH:USERNAME where hash is the 16 hex characters.
Code:
--
CE4A36B8E06CA59C:***
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
12 |
27,484 |
10-17-2012, 03:43 PM |
|
|
Thread: Passwords^12 - program & registration
Post: RE: Passwords^12 - program & registration
That's great news for me as well. Thanks! |
|
M@LIK |
Organisation and Events
|
9 |
20,083 |
10-16-2012, 12:14 AM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Good!
And yes, that's one way to use the sed command. I just wrote you the command you can utilize it in many ways.
Just to make sure everything is going in the right way, try cracking a known h... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,311 |
10-16-2012, 12:10 AM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Yes, just stack them in your command line:
Code:
--
... dict1.txt dict2.txt dict3.txt
--
Easy as that. |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,311 |
10-15-2012, 11:40 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
SnakeEye Wrote:
--
I actually tried removing first 9 chars and using a online decrypter which did not work :-)
--
Negative. Salted hashes can not be cracked using online DBs.
SnakeEye Wrote:
--
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,311 |
10-15-2012, 10:31 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Simple.
1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat:
Code:
--
sed "s#^\(.\{9\}\)\(.\{40\}\... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,311 |
10-15-2012, 09:58 PM |
|
|
Thread: hashcat-lite 0.8+ AMD 7970 Work?
Post: RE: hashcat-lite + AMD 7970 Work?
-lite is oclHashcat-lite-0.10 (https://hashcat.net/oclhashcat-lite/) now! |
|
M@LIK |
Hardware
|
4 |
8,947 |
10-09-2012, 07:15 PM |