Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
As far as I know, Cisco-PIX MD5 hashing doesn't involve any salting. |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 04:36 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
That's what I was exactly writing you, see below.
It's not very professional, but you can get away with rules or multi-rules.
Make a rule-file with all first four bytes of the usernames, you can... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 05:34 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules.
Code:
--
mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile
--
This above will brute-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 06:21 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Yes, I will be lying if I said I didn't think about that.
Indeed, maskprocessor's performance is nowhere around GPU's performance.
You can also make a file with all chopped usernames, analyze them... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-18-2012, 09:06 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Then -a7 is the way to go!
It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below:
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 05:49 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do:
Code:
--
perl CiscoASA.pl < usernames
--
CiscoASA.pl:
Code:
-... |
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
45,270 |
10-19-2012, 06:07 PM |
|
|
Thread: dictionary maker?
Post: RE: dictionary maker?
I assume you suffer from a brain damage so:
Code:
--
mp64 -1 ?l?d -o outputfile ?1?1?1?1?1?1
--
|
|
M@LIK |
General Help
|
7 |
13,280 |
10-20-2012, 03:32 PM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
I'm not sure, but I believe It's:
Code:
--
-j, --rule-left=RULE Single rule applied to each word from left dict
-k, --rule-right=RULE Single rule applied to each word f... |
|
M@LIK |
General Help
|
12 |
22,997 |
10-21-2012, 09:12 PM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
CPU's hashcat apply rules to the whole candidate, not separately. |
|
M@LIK |
General Help
|
12 |
22,997 |
10-21-2012, 09:14 PM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
If you want to make "Sup3rThinkers" out of "sup3r" in dict1 and "thinkers" in dict2, you would run:
Code:
--
-plus ... -a1 -j u -k u ... dict1 dict2
--
But you can't do it that simple with CPU's hash... |
|
M@LIK |
General Help
|
12 |
22,997 |
10-21-2012, 10:35 PM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
-plus's -a1 always works with two dicts (Right and left).
And yes, it was brought back due to a request: https://hashcat.net/forum/thread-1335.html
But careful, CPU's hashcat works with one dict a... |
|
M@LIK |
General Help
|
12 |
22,997 |
10-22-2012, 12:02 AM |
|
|
Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09
Yes, it's missing a dict. |
|
M@LIK |
Very old oclHashcat-plus Support
|
4 |
9,626 |
10-22-2012, 12:08 AM |
|
|
Thread: How to apply rules to combinator attack?
Post: RE: How to apply rules to combinator attack?
@epixoip (https://hashcat.net/forum/user-1746.html):: Single rules (-j, -k) do work with -a1. |
|
M@LIK |
General Help
|
12 |
22,997 |
10-22-2012, 11:17 AM |
|
|
Thread: DES(Unix): Terrible Bug
Post: DES(Unix): Terrible Bug
This is a bug report related to descrypt (-m1500) on CPU's hashcat only.
Whenever the flag\s --remove OR\AND -o is\are set while attacking descrypt list, hashcat messes the original hashfile OR\AND t... |
|
M@LIK |
Beta Tester
|
7 |
7,748 |
10-22-2012, 04:10 PM |
|
|
Thread: DES(Unix): Terrible Bug
Post: RE: DES(Unix): Terrible Bug
Haha, this just got worse.
hashcat-cli64.exe from https://hashcat.net/files/hashcat-0.41.7z is happy to crack any des hash using -m1500.
Folks, please welcome the new hidden algos...
NOTE: All ... |
|
M@LIK |
Beta Tester
|
7 |
7,748 |
10-22-2012, 04:27 PM |
|
|
Thread: DES(Unix): Terrible Bug
Post: RE: DES(Unix): Terrible Bug
As I mentioned:
M@LIK Wrote:
--
Note that some hashes remain intact, don't ask me why.
--
Mostly the outfile is the victim. And, yes, I also noticed nothing happens with two hashes. Try with, say, 2... |
|
M@LIK |
Beta Tester
|
7 |
7,748 |
10-22-2012, 09:51 PM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
I suppose you are on Windows. Try with -r nul since you aren't using any actual rules. |
|
M@LIK |
Old hashcat Support
|
13 |
22,258 |
10-22-2012, 10:58 PM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
Okay, I can't really explain why it doesn't print the time when using AsIs.rule, but if I were you I'd just modify my script in a way that if there's no rulefile set > use 'nul' as a rulefile and carr... |
|
M@LIK |
Old hashcat Support
|
13 |
22,258 |
10-23-2012, 12:36 AM |
|
|
Thread: Bruteforce/Mask captial and non capital letters?
Post: RE: Bruteforce/Mask captial and non capital letter...
Move the mask after the hashfile. |
|
M@LIK |
General Help
|
8 |
20,903 |
10-23-2012, 12:05 PM |
|
|
Thread: DES(Unix): Terrible Bug
Post: RE: DES(Unix): Terrible Bug
That sounds a bit awkward. It explains a lot though.
Anyways, sorry, I did not mean to spoil this.
Waiting for this getting officially supported. |
|
M@LIK |
Beta Tester
|
7 |
7,748 |
10-23-2012, 01:17 PM |