Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt
You'd just build it into your attack organically. Instead of a straight dictionary attack you'd either use -a 0 with prepend rules, -a 1, or -a 6. With -a 3 you'd prepend each mask with ?d?d. |
|
epixoip |
Old hashcat Support
|
5 |
12,594 |
06-07-2015, 06:51 AM |
|
|
Thread: Cracking simple sentences
Post: RE: Cracking simple sentences
Betawave Wrote: (11-17-2015, 12:39 AM)
--
I DO NOT have a wordlist with phrases
--
You've already identified the best approach. |
|
epixoip |
Old oclHashcat Support
|
6 |
11,234 |
11-17-2015, 02:22 AM |
|
|
Thread: Cracking with multiple PCs
Post: RE: Cracking with multiple PCs
vcl wouldn't work though, because hashcat does not supply any nvidia opencl kernels |
|
epixoip |
Very old oclHashcat-plus Support
|
6 |
14,644 |
09-26-2013, 07:46 PM |
|
|
Thread: Cracking WPA with hashcat news
Post: RE: Cracking WPA with hashcat news
Your syntax is all sorts of fucked up |
|
epixoip |
User Contributions
|
6 |
11,954 |
04-29-2017, 06:30 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
Your algorithm is nothing more than security through obscurity.
Immediate issues identified:
You're using a "global salt", so it isn't really a salt at all -- it's just a shared secret, which is n... |
|
epixoip |
General Talk
|
6 |
12,465 |
01-21-2014, 08:09 AM |
|
|
Thread: Creating mask file compliant to password policy
Post: RE: Creating mask file compliant to password polic...
|
epixoip |
General Help
|
1 |
3,416 |
03-15-2016, 11:54 PM |
|
|
Thread: Creating new or custom charset for hashcat
Post: RE: Creating new or custom charset for hashcat
https://hashcat.net/wiki/doku.php?id=mask_attack#custom_charsets |
|
epixoip |
Old hashcat Support
|
3 |
28,490 |
03-18-2016, 10:38 AM |
|
|
Thread: Creating rules
Post: RE: Creating rules
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
epixoip |
User Contributions
|
3 |
8,817 |
12-23-2014, 06:40 PM |
|
|
Thread: Creating rules
Post: RE: Creating rules
you need both 'c $1' on the same line to both capitalize and append a 1.
Code:
--
epixoip@token:~/hashcat-0.48$ echo -n Zbyszek1 | md5sum
be597e193161d97f91603b0aaa980218 -
epixoip@token:~/ha... |
|
epixoip |
User Contributions
|
3 |
8,817 |
12-23-2014, 08:14 PM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
As you've identified, most mining rigs run with bare-minimum CPU and RAM, and this is far from ideal for hash cracking rigs. You can sometimes get away with an underpowered CPU, though wordlist manipu... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-23-2015, 10:15 PM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
Atticuss Wrote: (02-23-2015, 10:55 PM)
--
How common is it for CPU cracking to be a better option than GPU? Does it come down to something as simple as hash type?
--
Hash type + attack mode. For ex... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-24-2015, 12:46 AM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
undeath Wrote: (02-24-2015, 12:23 AM)
--
logistix111 Wrote: (02-24-2015, 12:12 AM)
--
You will notice that a very large wordlist, like 2 gigabytes in size for example, will have a higher hashrate th... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-24-2015, 12:48 AM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
Not a very astute observation. Obviously you have to give the GPU enough work to do. If you only feed 120 candidates to an algorithm that can pull somewhere in the KH/s range, then you're obviously st... |
|
epixoip |
Hardware
|
11 |
20,085 |
02-24-2015, 01:24 AM |
|
|
Thread: cudaHashcat 0 H/s bcrypt
Post: RE: cudaHashcat 0 H/s bcrypt
0 H/s in this case doesn't mean literally "no hashes per second", it means the kernel is taking too long to run and hasn't reached a checkpoint yet and thus the main thread is not able to calculate th... |
|
epixoip |
Old oclHashcat Support
|
7 |
14,071 |
04-04-2016, 07:37 PM |
|
|
Thread: CudaHashcat 1.37 0H/s with Bcrypt
Post: RE: CudaHashcat 1.37 0H/s with Bcrypt
Looks like you've tested 2 candidates in 17 seconds, so your speed is ~ 0.11 H/s.
This is totally expected.
1. bcrypt is very slow, and depending on the cost value (uknown from above output), it... |
|
epixoip |
Old oclHashcat Support
|
3 |
6,189 |
08-24-2015, 08:56 PM |
|
|
Thread: CudaHashcat 1.37 0H/s with Bcrypt
Post: RE: CudaHashcat 1.37 0H/s with Bcrypt
There is a reason we tell people to use bcrypt. And, well, you're looking at that reason. |
|
epixoip |
Old oclHashcat Support
|
3 |
6,189 |
08-24-2015, 09:14 PM |
|
|
Thread: cudahashcat error
Post: RE: cudahashcat error
Your problem is ''-username''. Since you only have one dash before the word 'username,' getopt is interpreting that as "-u sername" and telling you that 'sername' is not a valid value. Long options al... |
|
epixoip |
Old oclHashcat Support
|
3 |
4,951 |
03-30-2016, 11:25 PM |
|
|
Thread: cudahashcat error
Post: RE: cudahashcat error
Maybe you should show us your exact command line then. |
|
epixoip |
Old oclHashcat Support
|
3 |
4,951 |
03-31-2016, 03:42 AM |
|
|
Thread: cudaHashcat freezing mid-attack
Post: RE: cudaHashcat freezing mid-attack
this is a bug in 1.31. wait for the next release. |
|
epixoip |
Old oclHashcat Support
|
5 |
8,855 |
11-14-2014, 10:35 PM |
|
|
Thread: cudaHashcat freezing mid-attack
Post: RE: cudaHashcat freezing mid-attack
yes, i know. it happens randomly. workaround is to just keep running it and crossing your fingers. |
|
epixoip |
Old oclHashcat Support
|
5 |
8,855 |
11-15-2014, 01:43 AM |