Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: my Geforce Gtx 670 doesn't work with oclHashcat-plus-0.09
Post: RE: my Geforce Gtx 670 doesn't work with oclHashca...
|
M@LIK |
Very old oclHashcat-lite Support
|
16 |
32,346 |
09-20-2012, 03:50 PM |
|
|
Thread: Nead help whit command
Post: RE: Nead help whit command
hmm..
there are couple of ways to do this.. 2 came through my mind..
1st::
u can make a script/bat file that checks every 60sec ((for example)) for the first output file "E52_355216034221476.txt"..... |
|
M@LIK |
Very old oclHashcat-lite Support
|
16 |
31,586 |
04-02-2012, 02:51 PM |
|
|
Thread: Nead help whit command
Post: RE: Nead help whit command
KT819GM is right.. u just make .cmd file::
Code:
--
[1st_job]
[2nd_job]
[3rd_job]
...
--
woks fine for me.. : ) |
|
M@LIK |
Very old oclHashcat-lite Support
|
16 |
31,586 |
04-03-2012, 06:20 PM |
|
|
Thread: Extracting the passwords from a multiple file wordlist (sed & grep).
Post: RE: Extracting the passwords from a multiple file ...
Optimization?
Code:
--
type *.* | sed '/pass=/I!d;s/pass=\(.*$\)/\1/I;s/^[ \t]*//;s/[ \t]*$//' | sort | uniq -c | sort -nr | cut -c9- > wordlist_FINAL.txt
--
|
|
M@LIK |
General Talk
|
12 |
30,913 |
06-14-2012, 07:35 PM |
|
|
Thread: Extracting the passwords from a multiple file wordlist (sed & grep).
Post: RE: Extracting the passwords from a multiple file ...
Agreed. Thanks for the input. |
|
M@LIK |
General Talk
|
12 |
30,913 |
06-14-2012, 09:34 PM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Are you sure?
Cause I generated the hash for "omgwtf" and here's what I found:
Code:
--
7f8f65c062e3a9536fad48fead0af65a:S$~./
--
7f8f65c062e3a9536fad48fead0af65a: S$~./:omgwtf
2811 = IPB2+, MyB... |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,291 |
05-16-2012, 12:27 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Ahh, yes... you gave two different salts -__-
Anyway, the hashes you provide are correct cracks:
Code:
--
d59be66565eeb562bb2b724d71b8a4e3:S$~!!:omgwtf
f179e7768678b3c5daa920bbfc75cffd:Fu~!!:474... |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,291 |
05-16-2012, 12:55 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Then, I'm sorry I don't know what's wrong there. |
|
M@LIK |
Very old oclHashcat-plus Support
|
13 |
30,291 |
05-16-2012, 01:06 AM |
|
|
Thread: howto use stats processor with oclHashcat+ v0.8?
Post: RE: howto use stats processor with oclHashcat+ v0....
Oi... WPA/WPA2 can't have 5 long characters string as a password!!
-You don't set --attack-mode when "stdin"ing.
-You used sp64 and then sp32, which one is yours?
-You used bin and then exe, which one... |
|
M@LIK |
Very old oclHashcat-plus Support
|
17 |
30,281 |
07-08-2012, 12:42 AM |
|
|
Thread: Start From Stop At Brute Force
Post: RE: Start From Stop At Brute Force
Thumbs up for these options in oclHashcat-plus:
Code:
--
-s, --pw-skip=NUM Start cracking at NUM
-f, --pw-skip-plain=STR Like --pw-skip, but start cracking at STR
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
15 |
29,325 |
06-01-2012, 02:09 AM |
|
|
Thread: Speed drop after playing game (Crysis3)
Post: RE: Speed drop after playing game (Crysis3)
epixoip Wrote:
--
this is the price you pay for free porn.
--
I see bright experience. |
|
M@LIK |
Very old oclHashcat-plus Support
|
20 |
29,275 |
02-26-2013, 09:04 PM |
|
|
Thread: Problem with brute-force
Post: RE: Problem with brute-force
Try coping the command line next to Start button and pasting it into the cmd window that popes up.
An advice: Try learning command-lines, GUI is definitely not for pros = ) |
|
M@LIK |
Old hashcat Support
|
14 |
28,919 |
07-09-2012, 06:06 PM |
|
|
Thread: Problem with brute-force
Post: RE: Problem with brute-force
*sighs*
Your card nVidia card doesn't support CUDA === NO oclhashcat-plus|lite for you, sorry ! |
|
M@LIK |
Old hashcat Support
|
14 |
28,919 |
07-09-2012, 08:35 PM |
|
|
Thread: Removing Bad Hashes
Post: RE: Removing Bad Hashes
Well, it always differs from one situation to another.
There's no one holly command which will help you always xD |
|
M@LIK |
General Talk
|
13 |
28,532 |
07-08-2012, 07:36 PM |
|
|
Thread: Removing Bad Hashes
Post: RE: Removing Bad Hashes
@Hash-IT (https://hashcat.net/forum/user-776.html):: Replaying to your PM too:
What you want to do can be easily done using the following RegEx command:
Code:
--
^00000[^0]
--
This will remove any... |
|
M@LIK |
General Talk
|
13 |
28,532 |
07-08-2012, 04:53 PM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
definitely supporting this..
+1 vote |
|
M@LIK |
Feature Requests
|
9 |
27,826 |
04-11-2012, 09:07 AM |
|
|
Thread: Oracle 11g Format
Post: RE: Oracle 11g Format
I guess that's not an Oracle 11g hash. Probably Oracle 7-10g.
Try -m3100, the correct format is HASH:USERNAME where hash is the 16 hex characters.
Code:
--
CE4A36B8E06CA59C:***
--
|
|
M@LIK |
Very old oclHashcat-plus Support
|
12 |
27,490 |
10-17-2012, 03:43 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Simple.
1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat:
Code:
--
sed "s#^\(.\{9\}\)\(.\{40\}\... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-15-2012, 09:58 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
SnakeEye Wrote:
--
I actually tried removing first 9 chars and using a online decrypter which did not work :-)
--
Negative. Salted hashes can not be cracked using online DBs.
SnakeEye Wrote:
--
C... |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-15-2012, 10:31 PM |
|
|
Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt
Yes, just stack them in your command line:
Code:
--
... dict1.txt dict2.txt dict3.txt
--
Easy as that. |
|
M@LIK |
Very old oclHashcat-plus Support
|
8 |
27,314 |
10-15-2012, 11:40 PM |