Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: sha256(pass.salt)
Post: RE: sha256(pass.salt)
Your command-line?
FYI, the thread is closed. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
11,797 |
11-17-2012, 06:11 PM |
|
|
Thread: sha256(pass.salt)
Post: RE: sha256(pass.salt)
Try something simple, like:
Code:
--
cudaHashcat-plus64 -m1410 -a3 A231FDDFB80C2EAC1EB4C38A36B9628F73A418988FCABD119C2E9C6E5F0E01E8::20120902:12 delicious90
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
11,797 |
11-17-2012, 06:20 PM |
|
|
Thread: Bad --hex-charset
Post: Bad --hex-charset
--hex-charset affects interpreting the whole command-line instead of working on charsets only.
See below:
Code:
--
// md5-fu
3631313171ffbf23b394fa8ecd9e83e5:zer0
// hashcat-fu
-plus -a3 --f... |
|
M@LIK |
Very old oclHashcat-plus Support
|
1 |
5,809 |
11-30-2012, 01:27 PM |
|
|
Thread: time estimate for brute forcing wpa2
Post: RE: time estimate for brute forcing wpa2
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
12,298 |
12-12-2012, 09:06 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
To fully utilize GPU, use separate lines.
Or at least, pipe the a-z part only and use rules on -plus's side.
Code:
--
mp64 --increment-min=6 ?l?l?l?l?l?l?l?l | -plus -r ./hybrid/append_d.rule -r ... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-14-2012, 11:15 PM |
|
|
Thread: oclHashcat-gui problem
Post: RE: oclHashcat-gui problem
Smart enough to take a screen shot and draw some retarded arrows and numbers but not to type a bloody YES.
... Dexter is only good at killing. |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
13,588 |
12-19-2012, 02:55 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
-plus reads s or p from STDIN (user's input), and since STDIN is busy with mp64 there's no way to read user's input, so the status show every 10 secs automatically.
Again, the neatest, best way to ... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-20-2012, 10:42 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
Code:
--
-plus hccap ?l?d?d
-plus hccap ?l?l?d?d
-plus hccap ?l?l?l?d?d
-plus hccap ?l?l?l?l?d?d
-plus hccap ?l?l?l?l?l?d?d
...
--
Run one at a time.
Another option is to make a loop:
Code:... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-20-2012, 11:16 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
I don't about WPA, but for simple hashing algorithms, see: https://www.md5decrypter.co.uk/hash-a-password.aspx |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-20-2012, 11:42 PM |
|
|
Thread: Hashcat Bruteforce attack
Post: RE: Hashcat Bruteforce attack
The following thread will help you:
https://hashcat.net/forum/thread-1836.html |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
48,691 |
12-30-2012, 02:37 PM |
|
|
Thread: Bugs at new version
Post: RE: Bugs at new version
Yes, seen before.
As far as I can tell, this happens because of the dict caching thing. Try removing hashcat.dictstat and try again.
Btw, it's no big deal the attack will exhaust when its finished. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,506 |
01-03-2013, 12:32 AM |
|
|
Thread: Multiple instances
Post: RE: Multiple instances
Yea, that pissed me off once, too.
Even --force didn't help.
-1 for this. |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
11,228 |
01-06-2013, 03:47 AM |
|
|
Thread: Multiple instances
Post: RE: Multiple instances
Interesting. Somehow, I missed that.
Perhaps rephrasing the error's massage would have helped in preventing such misunderstanding. Something like:
Code:
--
ERROR: oclHashcat-plus.restore is alrea... |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
11,228 |
01-06-2013, 07:12 AM |
|
|
Thread: Passwords With spaces
Post: RE: Passwords With spaces
Read the error.
The two dicts used in -a1 must not be empty. |
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
9,738 |
01-07-2013, 07:22 PM |
|
|
Thread: Not sure what I'm doing wrong here
Post: RE: Not sure what I'm doing wrong here
It's a known bug, reported already and fixed as well.
Temp. Workaround: Do multiple runs, 25 dict at a time should be fine. |
|
M@LIK |
Very old oclHashcat-plus Support
|
1 |
5,107 |
01-09-2013, 02:03 PM |
|
|
Thread: Not a single percent of progress : (
Post: RE: Not a single percent of progress : (
Only with -a0, I believe. |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
18,788 |
01-10-2013, 12:41 PM |
|
|
Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?
You're out of luck and you can not use hashcat to crack WPA if you don't have an AMD/Nvidia GPU.
But it's somewhat possible in oclHashcat-plus.
Your English is more than fine, self-underestimation... |
|
M@LIK |
Very old oclHashcat-plus Support
|
9 |
23,917 |
01-10-2013, 04:10 PM |
|
|
Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?
oclHashcat-plus, which is the only cat that cracks WPA currently, works using GPU, not CPU.
The keyspace in your bruteforce plan is quite big, so expect it to take too long, unless you have big toys,... |
|
M@LIK |
Very old oclHashcat-plus Support
|
9 |
23,917 |
01-10-2013, 05:18 PM |
|
|
Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?
Good, 9600 would work, don't know how fast, but it would.
I don't know why you're wanting to use BT while all hashcats, including plus, officially support Windows. |
|
M@LIK |
Very old oclHashcat-plus Support
|
9 |
23,917 |
01-10-2013, 06:31 PM |
|
|
Thread: understanding "Time.Estimated" in oclHashcat-plus "status" output
Post: RE: understanding "Time.Estimated" in oclHashcat-p...
My guess, it's calculated in real-time and it's a result of simple math depending on two factors. Current speed, left keyspace. |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
15,074 |
01-13-2013, 08:07 AM |