Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: How to see when over the 15 char limit?
Post: RE: How to see when over the 15 char limit?
Kgx Pnqvhm Wrote:
--
And when I run a bunch of dictionaries via a command file (Windows), I don't even see the status screens, until the last one.
The "Scanning dictionary" section didn't complain... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
15,416 |
09-30-2012, 10:16 PM |
|
|
Thread: sha512crypt hash error
Post: RE: sha512crypt hash error
Put the whole hash, starting with $6$ to if/. |
|
M@LIK |
Very old oclHashcat-plus Support
|
10 |
24,507 |
10-01-2012, 05:31 PM |
|
|
Thread: permission denied in hybrid mode
Post: RE: permission denied in hybrid mode
@Mem5 (https://hashcat.net/forum/user-513.html):: -a6|7 must work with real dict file. Stdin will not work. |
|
M@LIK |
Very old oclHashcat-plus Support
|
7 |
11,331 |
10-06-2012, 01:59 AM |
|
|
Thread: NVIDIA GeForce 7600 GS ..
Post: RE: NVIDIA GeForce 7600 GS ..
The latest WHQL driver is 306.23 not 301.42. Try installing that and see if it helps.
https://www.nvidia.com/Download/Find.aspx |
|
M@LIK |
Very old oclHashcat-plus Support
|
6 |
18,127 |
10-08-2012, 01:57 AM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Simple.
1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat:
Code:
--
sed "s#^\(.\{9\}\)\(.\{40\}\... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-15-2012, 09:58 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Yes, just stack them in your command line:
Code:
--
... dict1.txt dict2.txt dict3.txt
--
Easy as that. |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-15-2012, 11:40 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Good!
And yes, that's one way to use the sed command. I just wrote you the command you can utilize it in many ways.
Just to make sure everything is going in the right way, try cracking a known h... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-16-2012, 12:10 AM |
|
|
Thread: Oracle 11g Format
Post: RE: Oracle 11g Format
I guess that's not an Oracle 11g hash. Probably Oracle 7-10g.
Try -m3100, the correct format is HASH:USERNAME where hash is the 16 hex characters.
Code:
--
CE4A36B8E06CA59C:***
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
12 |
27,490 |
10-17-2012, 03:43 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
As far as I know, Cisco-PIX MD5 hashing doesn't involve any salting. |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 04:36 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
That's what I was exactly writing you, see below.
It's not very professional, but you can get away with rules or multi-rules.
Make a rule-file with all first four bytes of the usernames, you can... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 05:34 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
SnakeEye Wrote:
--
I actually tried removing first 9 chars and using a online decrypter which did not work :-)
--
Negative. Salted hashes can not be cracked using online DBs.
SnakeEye Wrote:
--
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-15-2012, 10:31 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules.
Code:
--
mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile
--
This above will brute-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 06:21 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Yes, I will be lying if I said I didn't think about that.
Indeed, maskprocessor's performance is nowhere around GPU's performance.
You can also make a file with all chopped usernames, analyze them... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 09:06 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Then -a7 is the way to go!
It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below:
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 05:49 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do:
Code:
--
perl CiscoASA.pl < usernames
--
CiscoASA.pl:
Code:
-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 06:07 PM |
|
|
Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09
Yes, it's missing a dict. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
9,624 |
10-22-2012, 12:08 AM |
|
|
Thread: Output with --show help.
Post: RE: Output with --show help.
oclHashcat-plus's --show is too simple to do that.
Apparently, you're on Windows. So grab gawk (Google it) and run the following kinda-ugly one-liner:
Code:
--
gawk -F: "FNR==NR{a[$2]=$1;next} $1... |
|
M@LIK |
Very old oclHashcat-plus Support
|
2 |
10,420 |
10-28-2012, 12:14 AM |
|
|
Thread: After format speed goes down 50% on HD 7970
Post: RE: After format speed goes down 50% on HD 7970
I don't think so.
Your file doesn't seem to exists.
Hold shift on your keyboard, right-click on the hashfile, select "Copy as path" and paste in your command line. |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
19,455 |
10-28-2012, 12:10 PM |
|
|
Thread: wordpress hash
Post: RE: wordpress hash
Replace "hash.txt" with the full path to the file. E.g.: "D:\mygayasianporno\hash.txt" |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
13,375 |
11-11-2012, 08:29 PM |
|
|
Thread: wordpress hash
Post: RE: wordpress hash
Yes, these hashes are normally slow. |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
13,375 |
11-11-2012, 08:37 PM |