Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: random gen
Post: RE: random gen
Gosh, Too many people have the same problems as mine, but I only solve them.
Just joking. : P
I discussed this here: https://hashcat.net/forum/thread-1107.html
Post:#10 is the "light". LOL
... |
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
9,823 |
05-11-2012, 09:25 PM |
|
|
Thread: random gen
Post: RE: random gen
@restrictedbytes (/forum/user-1158.html):: Yes, you are right, he made a mistake with the mask.
But, what was more important is he wanted to generate random strings, and the mask thing was just an at... |
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
9,823 |
05-11-2012, 11:56 PM |
|
|
Thread: hash file limit?
Post: RE: hash file limit?
From Home page (https://hashcat.net/oclhashcat-plus/):
Code:
--
Multi-Hash (up to 24 million hashes)
--
I tried loading 15M, It did work.
And I also highly doubt they're all MD5s. |
|
M@LIK |
Very old oclHashcat-plus Support
|
2 |
5,881 |
05-12-2012, 09:49 AM |
|
|
Thread: Large IPB list issue
Post: RE: Large IPB list issue
I think now I know what I was doing wrong:
Code:
--
Status.......: Running
Input.Mode...: ______
Hash.Target..: ______
Hash.Type....: IPB2+, MyBB1.2+
Time.Running.: 7 mins, 6 secs
Time.Left..... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
38,225 |
05-13-2012, 09:33 PM |
|
|
Thread: oclHashcat-plus --show question
Post: RE: Bruteforce LM
@Mem5 (https://hashcat.net/forum/user-513.html):: Hashcat deals with LM hashes as chunks (16-bit hashes):
1- --remove doesn't work with LMs.
2- I just noticed this, --show doesn't work too! whatever ... |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,597 |
05-15-2012, 01:53 PM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Are you sure?
Cause I generated the hash for "omgwtf" and here's what I found:
Code:
--
7f8f65c062e3a9536fad48fead0af65a:S$~./
--
7f8f65c062e3a9536fad48fead0af65a: S$~./:omgwtf
2811 = IPB2+, MyB... |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,291 |
05-16-2012, 12:27 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Then, I'm sorry I don't know what's wrong there. |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,291 |
05-16-2012, 01:06 AM |
|
|
Thread: oclHashcat-plus --show question
Post: RE: oclHashcat-plus --show question
@atom (https://hashcat.net/forum/user-1.html):: Yes! you are right, it's working for me.
I didn't know you have to set "-m" when using "--show".
And yeah, bytes not bits -__-
Too much ****. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,597 |
05-16-2012, 12:22 PM |
|
|
Thread: Problems with prefix rule.
Post: RE: Problems with prefix rule.
Simply the rules apply from left to right:
^1^2^3
Code:
--
^1 ^2 ^3
^1 === 1test >>> ^2 === 21test >>> ^3 === 321test
--
BUT:
^3^2^1
Code:
--
^3 ^2 ^1
^3 === 3tes... |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,778 |
05-17-2012, 01:06 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Ahh, yes... you gave two different salts -__-
Anyway, the hashes you provide are correct cracks:
Code:
--
d59be66565eeb562bb2b724d71b8a4e3:S$~!!:omgwtf
f179e7768678b3c5daa920bbfc75cffd:Fu~!!:474... |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,291 |
05-16-2012, 12:55 AM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
The hash and the password are not matching here, anyone else? |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
23,632 |
05-23-2012, 08:37 PM |
|
|
Thread: BruteForce Mode in SMF Hashes
Post: RE: BruteForce Mode in SMF Hashes
It does.
Use one mask at the end:
Code:
--
oclHashcat-plus32.exe -m 121 -n 160 -a 3 --remove -o crackedSMF.txt Forum.txt ?l?l?l?l?l
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
9,329 |
05-24-2012, 02:08 PM |
|
|
Thread: OpenCL Code for Oclhashcat-plus Kernel
Post: RE: OpenCL Code for Oclhashcat-plus Kernel
@undeath (https://hashcat.net/forum/user-85.html):: Nice catch pal xD
@NeonFlash (https://hashcat.net/forum/user-1148.html):: Delete the first post (By editing) and the whole thread will be deleted. |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
7,746 |
05-25-2012, 12:21 AM |
|
|
Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence
I've already thought about this.
The only solution I found is to generate words using maskprocess and piping them to sed, which will do the filtering thing.
Code:
--
mp64 ?u?u?u?u?u?u?u?u | sed '... |
|
M@LIK |
Very old oclHashcat-plus Support
|
125 |
250,821 |
05-23-2012, 01:21 AM |
|
|
Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence
Hash-IT Wrote:
--
Just a quick note, as I am testing WPA I am guessing I probably won't notice much of a speed reduction as WPA is such a slow algorithm anyway ?
--
It's not about the algorithm, It's... |
|
M@LIK |
Very old oclHashcat-plus Support
|
125 |
250,821 |
05-23-2012, 02:47 PM |
|
|
Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence
Hey,
I've been thinking about this lately, and good news is that I've more than one possible-valid solution in my mind.
Problem is I need more time for this, and that I don't have : (
I have final ex... |
|
M@LIK |
Very old oclHashcat-plus Support
|
125 |
250,821 |
05-25-2012, 09:36 PM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Verified.
Both hashcat and oclHashcat-plus cracked the pass as:
Code:
--
507620db658a3d55c367cc8273e2ee24:ьфдщн
--
Note: The dictionary file has to be UTF-8 Unicode (withOUT BOM)... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
23,632 |
05-25-2012, 09:47 PM |
|
|
Thread: Bruteforcing WPA
Post: RE: Bruteforcing WPA
You should read the wiki (https://hashcat.net/wiki/) more often.
You don't need any character's set, all you need is a Mask attack (https://hashcat.net/wiki/mask_attack).
Code:
--
meow -m2500 -a3 [... |
|
M@LIK |
Very old oclHashcat-plus Support
|
2 |
5,858 |
05-26-2012, 02:23 AM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Code:
--
hc64p ..\M\MD5.hash ..\M\Odic.dic -o..\M\OUT.out
cudaHashcat-plus v5.36 by atom starting...
Hashes: 1
Unique digests: 1
Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes
Rul... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
23,632 |
05-26-2012, 05:42 AM |
|
|
Thread: Bruteforcing wpa2
Post: RE: Bruteforcing wpa2
|
M@LIK |
Very old oclHashcat-plus Support
|
6 |
11,457 |
05-26-2012, 06:13 AM |