Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
Works here:
Code:
--
epixoip@token:~$ echo " |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 06:44 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
Too much overhead checking the length of each candidate. You can try using the other rule instead. Edit the rule file and replace |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 06:54 AM |
|
|
Thread: how to limit password character length
Post: RE: how to limit password character length
Yeah, slightly faster but not near as fast as not filtering at all. String manipulation is just too slow.
So in this case what I'd suggest doing is pre-filtering your wordlist.
Code:
--
awk '... |
|
epixoip |
Old hashcat Support
|
10 |
16,257 |
03-02-2015, 07:10 AM |
|
|
Thread: append a WORD in rules..
Post: RE: append a WORD in rules..
This is what the combinator attack is designed for, but you can use rules if you really want to. The way you identified using single-char append is the only way to do it. |
|
epixoip |
Old hashcat Support
|
7 |
12,046 |
03-02-2015, 12:48 PM |
|
|
Thread: Whirlpool + salt?
Post: RE: Whirlpool + salt?
use -m 6100 and manually add the salt with each attack |
|
epixoip |
Old hashcat Support
|
5 |
11,032 |
03-10-2015, 11:05 AM |
|
|
Thread: Whirlpool + salt?
Post: RE: Whirlpool + salt?
Yes, it's possible. I just told you how. Use -m 6100, and manually append the salt with each attack. Treat the salt as part of the password candidate you're attacking.
For example if the salt is '1... |
|
epixoip |
Old hashcat Support
|
5 |
11,032 |
03-10-2015, 10:34 PM |
|
|
Thread: Apples Password Helper
Post: RE: Apples Password Helper
You hijacked someone else's thread by posting your own question on someone else's question. This is against the forum rules, and also why your question was split out into a separate thread.
No, Has... |
|
epixoip |
Old hashcat Support
|
6 |
10,926 |
03-11-2015, 11:14 AM |
|
|
Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms
|
epixoip |
Old hashcat Support
|
12 |
20,948 |
04-22-2015, 09:52 PM |
|
|
Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms
You are correct, that would be cool to have in hashcat. And John the Ripper actually already has such functionality on CPU (see doc/DYNAMIC), but not GPU.
I actually started work on a project a cou... |
|
epixoip |
Old hashcat Support
|
12 |
20,948 |
04-22-2015, 09:31 PM |
|
|
Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms
Welp, there's my motivation right there :P
I'M GONNA PROVE YOU WRONG, JENS! :) |
|
epixoip |
Old hashcat Support
|
12 |
20,948 |
04-24-2015, 03:50 AM |
|
|
Thread: Can't crack salted sha1 hashes from mac (line length exeption)
Post: RE: Can't crack salted sha1 hashes from mac (line ...
OSX 10.6 is -m 122, not -m 100. You also are not formatting the hash correctly. See https://hashcat.net/wiki/doku.php?id=example_hashes
In your MD5 attack it appears the wordlist you are attempting ... |
|
epixoip |
Old hashcat Support
|
2 |
6,362 |
05-09-2015, 03:29 AM |
|
|
Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt
If you didn't obtain the salts along with the hashes, then you'll need to crack the salts along with the hashes. This is trivial since the salt is only two digits. Basically you'd just use -m 1400 and... |
|
epixoip |
Old hashcat Support
|
5 |
12,594 |
06-07-2015, 02:40 AM |
|
|
Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt
You'd just build it into your attack organically. Instead of a straight dictionary attack you'd either use -a 0 with prepend rules, -a 1, or -a 6. With -a 3 you'd prepend each mask with ?d?d. |
|
epixoip |
Old hashcat Support
|
5 |
12,594 |
06-07-2015, 06:51 AM |
|
|
Thread: hash type check plz..
Post: RE: hash type check plz..
DO. NOT. POST. HASHES.
Quote:
--
> epixoip rolls the 1d10 of destiny
> 7
--
|
|
epixoip |
Old hashcat Support
|
1 |
4,654 |
06-09-2015, 10:44 AM |
|
|
Thread: TeamSpeak Hash?
Post: RE: TeamSpeak Hash?
Appears to be based on SHA1. Maybe salted with channel name or something? |
|
epixoip |
Old hashcat Support
|
13 |
25,730 |
06-19-2015, 02:44 AM |
|
|
Thread: WPA2 with hashcat help
Post: RE: WPA2 with hashcat help
|
epixoip |
Old hashcat Support
|
1 |
4,159 |
07-16-2015, 09:01 AM |
|
|
Thread: need to plain text of wpa2
Post: RE: need to plain text of wpa2
It looks like he doesn't know the password, simply wants us to crack it for him since he doesn't have a GPU. Therefore, he gets the banhammer. |
|
epixoip |
Old hashcat Support
|
2 |
5,189 |
07-18-2015, 12:38 AM |
|
|
Thread: Office 2013
Post: RE: Office 2013
Sorry, hashcat-cli does not support Office. |
|
epixoip |
Old hashcat Support
|
3 |
7,850 |
07-21-2015, 07:45 PM |
|
|
Thread: Newbie help...
Post: RE: Newbie help...
Quote:
--
epixoip hashcat-0.50 $ ./hashcat-cli64.bin -h
hashcat, advanced password recovery
Usage: hashcat [options] hashfile [mask|wordfiles|directories]
--
|
|
epixoip |
Old hashcat Support
|
4 |
7,610 |
07-24-2015, 01:58 AM |
|
|
Thread: Hashcat Gentoo - Cracks hashes twice
Post: RE: Hashcat Gentoo - Cracks hashes twice
hashcat-cli does not have full potfile support like oclHashcat has, it's basically just an output file and nothing more. The traditional way to solve this problem is to use the --remove switch to remo... |
|
epixoip |
Old hashcat Support
|
2 |
5,677 |
07-24-2015, 01:34 PM |