Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Help with simple mask
Post: Help with simple mask
Why is this working?
Code:
--
hashcat-cli64.exe --stdout -a 3 -m 0 hash.txt -i -1 ?u ?1?1?1?1?1?1?1?1
--
It seems to be using the hash as charset |
|
mrmike |
Old hashcat Support
|
4 |
6,365 |
04-10-2016, 06:26 PM |
|
|
Thread: Help with simple mask
Post: RE: Help with simple mask
Actually, when I remove --stdout it seems to work fine. |
|
mrmike |
Old hashcat Support
|
4 |
6,365 |
04-10-2016, 06:32 PM |
|
|
Thread: Help with simple mask
Post: RE: Help with simple mask
Xanadrel Wrote: (04-10-2016, 06:31 PM)
--
I don't think you know what --stdout does.
--
Evidently, I thought it was a way to see what is being generated. |
|
mrmike |
Old hashcat Support
|
4 |
6,365 |
04-10-2016, 06:33 PM |
|
|
Thread: Triple Dictionary Attack
Post: Triple Dictionary Attack
Using oclhashcat, is there a way to use a 3 dictionary combinator attack? Separating each work with a hyphen? |
|
mrmike |
General Help
|
1 |
3,572 |
04-17-2016, 05:15 PM |
|
|
Thread: Excel Password Hash Extraction
Post: Excel Password Hash Extraction
I have an xlsx file that is not encrypted but still requires a password to enable editing.
https://i.imgur.com/4efCwqY.png
Using office2hashcat gives me an error:
Quote:
--
holiday.xlsx : zip ... |
|
mrmike |
General Talk
|
3 |
7,356 |
08-14-2017, 07:10 PM |
|
|
Thread: Hashcat Brain
Post: Hashcat Brain
Does brain remember everything that has been attempted?
For example if I run a dictionary attack, and then run a bruteforce attack with rules with overlapping candidates, would those candidates b... |
|
mrmike |
hashcat
|
5 |
2,295 |
05-26-2019, 11:40 AM |
|
|
Thread: Hashcat Brain
Post: RE: Hashcat Brain
I found the above tests had an unexpected result, however with "--brain-client-features 3" it works as expected. For some reason I thought that was enabled by default. Thanks! Not sure if WPA is consi... |
|
mrmike |
hashcat
|
5 |
2,295 |
05-26-2019, 12:40 PM |
|
|
Thread: Restore value is greater than keyspace
Post: Restore value is greater than keyspace
Code:
--
hashcat64.exe -a 3 -m 0 [xx.hash.xx] masks\my_mask.hcmask -w 4 --status
--
Quote:
--
Session..........: hashcat
Status...........: Exhausted
Hash.Type........: MD5
Hash.Target......: ... |
|
mrmike |
hashcat
|
6 |
2,887 |
06-01-2019, 03:06 PM |
|
|
Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace
Good catch! You're theory also works with the example I gave above, from keyspace 67,600,000 to 10,194,220,608. I hope you guys don't have too much headache with a fix. |
|
mrmike |
hashcat
|
6 |
2,887 |
06-02-2019, 03:42 PM |
|
|
Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace
Sorry, I was using the 'actual' keyspace, and also the mask before instead of mask after, when using the --keyspace flag:
Mask 1592: 580,008
Mask 1593: 67,600 |
|
mrmike |
hashcat
|
6 |
2,887 |
06-02-2019, 03:59 PM |
|
|
Thread: Word-4digits-symbol-word
Post: Word-4digits-symbol-word
I have an MD5 hash that is in the following format:
?u?l?l?l?s?d?d?d?d?u?l?l?l?l?l?l
[Word][symbol][4 digits][Different Word]
Is there any way to run a left/right dictionary with rules to brute t... |
|
mrmike |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
0 |
743 |
01-26-2020, 04:08 PM |