Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Benchmark compare algorithms
Post: RE: Benchmark compare algorithms
bcrypt is always benchmarked with a cost of 5 for historical reasons. Much easier to compare the performance of new devices to old/older devices and even different software by keeping the cost factor ... |
|
epixoip |
General Help
|
6 |
9,134 |
03-11-2016, 04:13 PM |
|
|
Thread: Creating mask file compliant to password policy
Post: RE: Creating mask file compliant to password polic...
|
epixoip |
General Help
|
1 |
3,416 |
03-15-2016, 11:54 PM |
|
|
Thread: Help using oclHashcat to retrieve OS X 10.11 Password
Post: RE: Help using oclHashcat to retrieve OS X 10.11 P...
Literally first result on Google: https://apple.stackexchange.com/questions/186893/os-x-10-9-where-are-password-hashes-stored |
|
epixoip |
General Help
|
4 |
9,718 |
03-21-2016, 07:05 PM |
|
|
Thread: Help using oclHashcat to retrieve OS X 10.11 Password
Post: RE: Help using oclHashcat to retrieve OS X 10.11 P...
Literally linked in the accepted answer in the above link that I linked you to: https://web.archive.org/web/20140703020831/https://www.michaelfairley.co/blog/2014/05/18/how-to-extract-os-x-mavericks-p... |
|
epixoip |
General Help
|
4 |
9,718 |
03-23-2016, 02:25 AM |
|
|
Thread: Decrypt WPA2 Key
Post: RE: Decrypt WEP Key
|
epixoip |
General Help
|
5 |
8,503 |
03-23-2016, 08:24 PM |
|
|
Thread: hash-identifier md5crypt?
Post: RE: hash-identifier md5crypt?
You've been here long enough to know posting hashes is against the rules. |
|
epixoip |
General Help
|
1 |
3,700 |
03-27-2016, 11:33 PM |
|
|
Thread: Cli + Rule odd behave
Post: RE: Cli + Rule odd behave
I think the problem here is you do not realize what --stdout means. --stdout means print every single candidate that is generated to --stdout, e.g. for piping into another cracking application. You wo... |
|
epixoip |
General Help
|
5 |
6,915 |
04-01-2016, 11:29 AM |
|
|
Thread: Cli + Rule odd behave
Post: RE: Cli + Rule odd behave
Oh shit, right, I'm sorry. I was drunk when I wrote that. So yes, you're right, when using --stdout no cracking is possible at all, because it will indeed treat all arguments as a wordlist. Sorry. But... |
|
epixoip |
General Help
|
5 |
6,915 |
04-01-2016, 08:31 PM |
|
|
Thread: Cli + Rule odd behave
Post: RE: Cli + Rule odd behave
Yes --stdout is mostly for generating candidates to pipe to other crackers or preprocessors, but also a little for "is this rule doing what I think it's doing." |
|
epixoip |
General Help
|
5 |
6,915 |
04-02-2016, 03:37 AM |
|
|
Thread: hexchar des?
Post: RE: hexchar des?
-m 1500 is descrypt, not DES encryption. |
|
epixoip |
General Help
|
2 |
4,387 |
04-03-2016, 11:56 PM |
|
|
Thread: Mask generator not working?
Post: RE: Mask generator not working?
Is it iterating over binary or hex-encoded sha256? |
|
epixoip |
General Help
|
7 |
10,508 |
04-09-2016, 07:39 AM |
|
|
Thread: Mask generator not working?
Post: RE: Mask generator not working?
The best way to handle this would be to add a new mode that can do iterated sha256. If it were binary I'd say base it off of 7400, but since it's hex you'll have to do a bit more work. Would probably ... |
|
epixoip |
General Help
|
7 |
10,508 |
04-09-2016, 09:50 PM |
|
|
Thread: Triple Dictionary Attack
Post: RE: Triple Dictionary Attack
No but if the dictionaries are small enough you could pre-process the 2-word combinations then run -a 1 -k ^- |
|
epixoip |
General Help
|
1 |
3,575 |
04-17-2016, 09:25 PM |
|
|
Thread: Help me!!!
Post: RE: Help me!!!
Your GPU is too old and Nvidia no longer supports it. You need to upgrade your GPU. |
|
epixoip |
General Help
|
2 |
4,301 |
04-18-2016, 06:39 PM |
|
|
Thread: office2hashcat.py error
Post: RE: office2hashcat.py error
Cool, any chance you can create a PR for office2hashcat.py on github? |
|
epixoip |
General Help
|
8 |
13,071 |
04-20-2016, 09:18 AM |
|
|
Thread: Need Help to find out hash type
Post: RE: Need Help to find out hash type
Signatures like that are almost always hmac. |
|
epixoip |
General Help
|
6 |
7,711 |
05-17-2016, 07:53 PM |
|
|
Thread: Noob: Cracking SHA1 with known partial
Post: RE: Noob: Cracking SHA1 with known partial
Sure, just do a mask attack. Since the unknown content is variable-length you'd probably use an hcmask file. |
|
epixoip |
General Help
|
6 |
14,272 |
05-18-2016, 07:58 PM |
|
|
Thread: Noob: Cracking SHA1 with known partial
Post: RE: Noob: Cracking SHA1 with known partial
The only thing you're really doing wrong is using a virtual machine. There's zero reason to do that, there's a hashcat for every OS.
The other problem is that you didn't really specify in your fir... |
|
epixoip |
General Help
|
6 |
14,272 |
05-19-2016, 04:43 AM |
|
|
Thread: Noob: Cracking SHA1 with known partial
Post: RE: Noob: Cracking SHA1 with known partial
You said 53-55 chars but your mask is 57 chars... |
|
epixoip |
General Help
|
6 |
14,272 |
05-19-2016, 10:10 AM |
|
|
Thread: How to optimize attacking very large hashes
Post: RE: How to optimize attacking very large hashes
Don't use --remove, use --show and --left with -o /dev/null instead. |
|
epixoip |
General Help
|
3 |
7,036 |
06-14-2016, 06:15 PM |