Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Is it possible to find the salt for a known password?
Post: RE: Is it possible to find the salt for a known pa...
If it's static across all users then it's not a salt, it's a shared secret -- AKA, "pepper."
But my advice still stands. Use -m 1410 and supply the hash in "hash:salt" format. Or in this case, "has... |
|
epixoip |
Old hashcat Support
|
6 |
10,995 |
01-17-2015, 11:54 PM |
|
|
Thread: Is it possible to find the salt for a known password?
Post: RE: Is it possible to find the salt for a known pa...
Cool, glad you got it sorted. |
|
epixoip |
Old hashcat Support
|
6 |
10,995 |
01-18-2015, 07:13 AM |
|
|
Thread: [help] Unknown option --output-file= "error"
Post: RE: [help] Unknown option --output-file= "error"
because --output-file is not a valid option. read --help, read the wiki.
also you're using an old version of hashcat. |
|
epixoip |
Old hashcat Support
|
9 |
12,627 |
02-08-2015, 12:26 AM |
|
|
Thread: only cracking the first part ?
Post: RE: only cracking the first part ?
Sorry, this is not possible.
Also your math is wrong, the keyspace would be 95^35. Not that it really matters. |
|
epixoip |
Old hashcat Support
|
3 |
5,877 |
02-08-2015, 12:28 AM |
|
|
Thread: only cracking the first part ?
Post: RE: only cracking the first part ?
You would be able to reduce the keyspace with a targeted mask attack, but I don't think it will matter much. |
|
epixoip |
Old hashcat Support
|
3 |
5,877 |
02-08-2015, 02:03 AM |
|
|
Thread: [help] Unknown option --output-file= "error"
Post: RE: [help] Unknown option --output-file= "error"
The video on youtube was likely using a very old version. Read the documentation. Understand what you are typing, and why. |
|
epixoip |
Old hashcat Support
|
9 |
12,627 |
02-08-2015, 02:04 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
https://hashcat.net/wiki/doku.php?id=rule_based_attack
You could use '6 or |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 06:08 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
No, like this:
Code:
--
echo " |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 06:30 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
Works here:
Code:
--
epixoip@token:~$ echo " |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 06:44 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
Too much overhead checking the length of each candidate. You can try using the other rule instead. Edit the rule file and replace |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 06:54 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
Yeah, slightly faster but not near as fast as not filtering at all. String manipulation is just too slow.
So in this case what I'd suggest doing is pre-filtering your wordlist.
Code:
--
awk '... |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 07:10 AM |
|
|
Thread: append a WORD in rules..
Post: RE: append a WORD in rules..
This is what the combinator attack is designed for, but you can use rules if you really want to. The way you identified using single-char append is the only way to do it. |
|
epixoip |
Old hashcat Support
|
7 |
12,046 |
03-02-2015, 12:48 PM |
|
|
Thread: Whirlpool + salt?
Post: RE: Whirlpool + salt?
use -m 6100 and manually add the salt with each attack |
|
epixoip |
Old hashcat Support
|
5 |
11,032 |
03-10-2015, 11:05 AM |
|
|
Thread: Whirlpool + salt?
Post: RE: Whirlpool + salt?
Yes, it's possible. I just told you how. Use -m 6100, and manually append the salt with each attack. Treat the salt as part of the password candidate you're attacking.
For example if the salt is '1... |
|
epixoip |
Old hashcat Support
|
5 |
11,032 |
03-10-2015, 10:34 PM |
|
|
Thread: Apples Password Helper
Post: RE: Apples Password Helper
You hijacked someone else's thread by posting your own question on someone else's question. This is against the forum rules, and also why your question was split out into a separate thread.
No, Has... |
|
epixoip |
Old hashcat Support
|
6 |
10,926 |
03-11-2015, 11:14 AM |
|
|
Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms
|
epixoip |
Old hashcat Support
|
12 |
20,948 |
04-22-2015, 09:52 PM |
|
|
Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms
You are correct, that would be cool to have in hashcat. And John the Ripper actually already has such functionality on CPU (see doc/DYNAMIC), but not GPU.
I actually started work on a project a cou... |
|
epixoip |
Old hashcat Support
|
12 |
20,948 |
04-22-2015, 09:31 PM |
|
|
Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms
Welp, there's my motivation right there :P
I'M GONNA PROVE YOU WRONG, JENS! :) |
|
epixoip |
Old hashcat Support
|
12 |
20,948 |
04-24-2015, 03:50 AM |
|
|
Thread: Can't crack salted sha1 hashes from mac (line length exeption)
Post: RE: Can't crack salted sha1 hashes from mac (line ...
OSX 10.6 is -m 122, not -m 100. You also are not formatting the hash correctly. See https://hashcat.net/wiki/doku.php?id=example_hashes
In your MD5 attack it appears the wordlist you are attempting ... |
|
epixoip |
Old hashcat Support
|
2 |
6,362 |
05-09-2015, 03:29 AM |
|
|
Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt
If you didn't obtain the salts along with the hashes, then you'll need to crack the salts along with the hashes. This is trivial since the salt is only two digits. Basically you'd just use -m 1400 and... |
|
epixoip |
Old hashcat Support
|
5 |
12,594 |
06-07-2015, 02:40 AM |