Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules.
Code:
--
mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile
--
This above will brute-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 06:21 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Yes, I will be lying if I said I didn't think about that.
Indeed, maskprocessor's performance is nowhere around GPU's performance.
You can also make a file with all chopped usernames, analyze them... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 09:06 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Then -a7 is the way to go!
It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below:
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 05:49 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do:
Code:
--
perl CiscoASA.pl < usernames
--
CiscoASA.pl:
Code:
-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 06:07 PM |
|
|
Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09
Yes, it's missing a dict. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
9,624 |
10-22-2012, 12:08 AM |
|
|
Thread: Output with --show help.
Post: RE: Output with --show help.
oclHashcat-plus's --show is too simple to do that.
Apparently, you're on Windows. So grab gawk (Google it) and run the following kinda-ugly one-liner:
Code:
--
gawk -F: "FNR==NR{a[$2]=$1;next} $1... |
|
M@LIK |
Very old oclHashcat-plus Support
|
2 |
10,422 |
10-28-2012, 12:14 AM |
|
|
Thread: After format speed goes down 50% on HD 7970
Post: RE: After format speed goes down 50% on HD 7970
I don't think so.
Your file doesn't seem to exists.
Hold shift on your keyboard, right-click on the hashfile, select "Copy as path" and paste in your command line. |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
19,455 |
10-28-2012, 12:10 PM |
|
|
Thread: wordpress hash
Post: RE: wordpress hash
Replace "hash.txt" with the full path to the file. E.g.: "D:\mygayasianporno\hash.txt" |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
13,377 |
11-11-2012, 08:29 PM |
|
|
Thread: wordpress hash
Post: RE: wordpress hash
Yes, these hashes are normally slow. |
|
M@LIK |
Very old oclHashcat-plus Support
|
3 |
13,377 |
11-11-2012, 08:37 PM |
|
|
Thread: sha256(pass.salt)
Post: RE: sha256(pass.salt)
Your command-line?
FYI, the thread is closed. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
11,797 |
11-17-2012, 06:11 PM |
|
|
Thread: sha256(pass.salt)
Post: RE: sha256(pass.salt)
Try something simple, like:
Code:
--
cudaHashcat-plus64 -m1410 -a3 A231FDDFB80C2EAC1EB4C38A36B9628F73A418988FCABD119C2E9C6E5F0E01E8::20120902:12 delicious90
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
11,797 |
11-17-2012, 06:20 PM |
|
|
Thread: Bad --hex-charset
Post: Bad --hex-charset
--hex-charset affects interpreting the whole command-line instead of working on charsets only.
See below:
Code:
--
// md5-fu
3631313171ffbf23b394fa8ecd9e83e5:zer0
// hashcat-fu
-plus -a3 --f... |
|
M@LIK |
Very old oclHashcat-plus Support
|
1 |
5,810 |
11-30-2012, 01:27 PM |
|
|
Thread: time estimate for brute forcing wpa2
Post: RE: time estimate for brute forcing wpa2
|
M@LIK |
Very old oclHashcat-plus Support
|
5 |
12,300 |
12-12-2012, 09:06 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
To fully utilize GPU, use separate lines.
Or at least, pipe the a-z part only and use rules on -plus's side.
Code:
--
mp64 --increment-min=6 ?l?l?l?l?l?l?l?l | -plus -r ./hybrid/append_d.rule -r ... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-14-2012, 11:15 PM |
|
|
Thread: oclHashcat-gui problem
Post: RE: oclHashcat-gui problem
Smart enough to take a screen shot and draw some retarded arrows and numbers but not to type a bloody YES.
... Dexter is only good at killing. |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
13,590 |
12-19-2012, 02:55 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
-plus reads s or p from STDIN (user's input), and since STDIN is busy with mp64 there's no way to read user's input, so the status show every 10 secs automatically.
Again, the neatest, best way to ... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-20-2012, 10:42 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
Code:
--
-plus hccap ?l?d?d
-plus hccap ?l?l?d?d
-plus hccap ?l?l?l?d?d
-plus hccap ?l?l?l?l?d?d
-plus hccap ?l?l?l?l?l?d?d
...
--
Run one at a time.
Another option is to make a loop:
Code:... |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-20-2012, 11:16 PM |
|
|
Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied
I don't about WPA, but for simple hashing algorithms, see: https://www.md5decrypter.co.uk/hash-a-password.aspx |
|
M@LIK |
Very old oclHashcat-plus Support
|
11 |
22,058 |
12-20-2012, 11:42 PM |
|
|
Thread: Hashcat Bruteforce attack
Post: RE: Hashcat Bruteforce attack
The following thread will help you:
https://hashcat.net/forum/thread-1836.html |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
48,691 |
12-30-2012, 02:37 PM |
|
|
Thread: Bugs at new version
Post: RE: Bugs at new version
Yes, seen before.
As far as I can tell, this happens because of the dict caching thing. Try removing hashcat.dictstat and try again.
Btw, it's no big deal the attack will exhaust when its finished. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
8,506 |
01-03-2013, 12:32 AM |