Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Possible to do attack mode 6 and 7 on same attack
Post: RE: Possible to do attack mode 6 and 7 on same att...
The dict I want to use is only 2184 words… so I did this:
Code:
--
./hashcat -O -w3 -a7 ?a?a dict.txt --stdout > prependaa.txt
./maskprocessor-0.73/mp64.app '$?a$?a$?a$?a' > appendaaaa.rule
--
... |
|
walterlacka |
hashcat
|
6 |
5,301 |
12-20-2017, 05:43 PM |
|
|
Thread: Begginer cracking
Post: RE: Begginer cracking
Hahha.. in what format should we respond to you if your head will fall off if we respond with numbers? |
|
walterlacka |
Hardware
|
6 |
5,743 |
03-22-2018, 08:47 PM |
|
|
Thread: Begginer cracking
Post: RE: Begginer cracking
In your case you have 14 potential (2-9 and a-f). And that is of length 10. That would be 14^10. Take that and divide by the rate at which you can hash and you'll find your answer. |
|
walterlacka |
Hardware
|
6 |
5,743 |
03-22-2018, 09:14 PM |
|
|
Thread: Question about hccapx file
Post: RE: Question about hccapx file
IIRC, I think I needed to add a library or something first.
If you poke around this forum, I think there may be a post that talks about this. |
|
walterlacka |
General Talk
|
6 |
4,363 |
06-05-2018, 02:49 PM |
|
|
Thread: Help with cracking a zip Password
Post: RE: Help with cracking a zip Password
Any difference if you do this?
hashcat64 -a 3 -1 abcdef1234567890+- test.hash ?1?1?1?1?1?1?1?1?1?1 |
|
walterlacka |
hashcat
|
5 |
24,593 |
11-30-2017, 10:39 PM |
|
|
Thread: Help with cracking a zip Password
Post: RE: Help with cracking a zip Password
You'll need a -m parameter as well. |
|
walterlacka |
hashcat
|
5 |
24,593 |
12-01-2017, 01:03 AM |
|
|
Thread: Weird estimated time
Post: RE: Weird estimated time
7 character for WPA???!!!? Thought you needed 8. |
|
walterlacka |
hashcat
|
5 |
3,462 |
06-05-2018, 02:48 PM |
|
|
Thread: crackingxkcd with a combinator attack and a sizeable dictionary [HELP]
Post: RE: crackingxkcd with a combinator attack and a si...
I asked a similar question recently, and was pointed to using princeprocessor.
See:
Code:
--
https://hashcat.net/forum/thread-7147-post-38383.html
--
Hope this helps. |
|
walterlacka |
hashcat
|
4 |
3,324 |
01-01-2018, 08:20 PM |
|
|
Thread: Single 15 char NTLM Hash with known info
Post: Single 15 char NTLM Hash with known info
Trying to crack a single 15-length NTLM hash. I know the following:
1 - special
1 - upper
13 - lower
no - digits
consists of 6 words (no spaces)
it's a phrase
Assume cracking rig has 2 GTX1... |
|
walterlacka |
General Talk
|
4 |
3,363 |
12-31-2017, 01:55 AM |
|
|
Thread: Single 15 char NTLM Hash with known info
Post: RE: Single 15 char NTLM Hash with known info
Thanks for the suggestion - I'll give it a try.
One question though - since I want to take advantage of GPU as much as possible, and with this being fast hash, I'll be using either the prince_optim... |
|
walterlacka |
General Talk
|
4 |
3,363 |
01-01-2018, 08:17 PM |
|
|
Thread: crackingxkcd with a combinator attack and a sizeable dictionary [HELP]
Post: RE: crackingxkcd with a combinator attack and a si...
To get a better understanding of how the tool works, I created a small dictionary of 5 words and ran the tool against it. I watched on my screen the candidates it produced. I also used the --help sw... |
|
walterlacka |
hashcat
|
4 |
3,324 |
01-01-2018, 08:53 PM |
|
|
Thread: Prince processor capability
Post: RE: Prince processor capability
Does the --elem-cnt-min=4 and --elem-cnt-max=4 help? |
|
walterlacka |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,503 |
01-04-2018, 01:34 AM |
|
|
Thread: Prince processor capability
Post: RE: Prince processor capability
Code:
--
cat dict.txt
this
orange
rocks
and
--
Code:
--
./pp64.app --elem-cnt-min=4 --elem-cnt-max=4 --pw-max=20 < dict.txt
andandandand
andandandthis
andandthisand
andthisandand
this... |
|
walterlacka |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,503 |
01-04-2018, 05:07 PM |
|
|
Thread: How to save progress with PRINCE ?
Post: RE: How to save progress with PRINCE ?
Check this thread as well - in Royce's response, it shows how to script this such that you don't need to know the -s value before running from the CLI:
https://hashcat.net/forum/thread-7166.html |
|
walterlacka |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
3,617 |
08-22-2018, 09:37 PM |
|
|
Thread: Will HD7970 (R9 280X) still work with Hashcat?
Post: Will HD7970 (R9 280X) still work with Hashcat?
I'm dusting off an older rig from a couple years ago that has 2X HD7970 GPU's in it ( I believe they are the same thing as R9 280X.). Yeah, I realize that AMD isn't what it used to be for cracking ... |
|
walterlacka |
Hardware
|
3 |
4,389 |
11-03-2017, 11:54 PM |
|
|
Thread: Will HD7970 (R9 280X) still work with Hashcat?
Post: RE: Will HD7970 (R9 280X) still work with Hashcat?
Thanks for the replies. I ended up loading Win 10 and the latest Radeon Crimson drivers and it's now working. Not ideal, but for now gets the job done. |
|
walterlacka |
Hardware
|
3 |
4,389 |
11-07-2017, 04:09 PM |
|
|
Thread: Using PACK - Interesting Results
Post: Using PACK - Interesting Results
New to using PACK so maybe using it incorrectly.. here's what I'm seeing:
Code:
--
python policygen.py --minlength=9 --maxlength=9 --mindigit=1 --maxdigit=3 --minspecial=1 --maxspecial=2 --minuppe... |
|
walterlacka |
General Talk
|
3 |
3,367 |
12-01-2017, 04:02 AM |
|
|
Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results
That worked. Thanks philsmd. |
|
walterlacka |
General Talk
|
3 |
3,367 |
12-01-2017, 03:03 PM |
|
|
Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results
Now I've got myself thoroughly confused.. I ran the following (using the fix that philsmd pointed me to):
Code:
--
[*]Using 12,000,000,000 keys/sec for calculations.
[*]Password policy:
P... |
|
walterlacka |
General Talk
|
3 |
3,367 |
12-02-2017, 06:03 PM |
|
|
Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...
Does this work?
./hashcat -w 4 -m 2500 -a 3 Dump.hccapx -1 ABDF 071?1?1?d?1?1?14
Couldn't tell based on the BOLD which was -1 and which was -l (bad eyes) |
|
walterlacka |
hashcat
|
3 |
2,888 |
03-16-2018, 07:26 PM |