Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: An idea for using CPU hash cracking with hashtopus
Post: RE: An idea for using CPU hash cracking with hasht...
1. This is the Hashcat forums, not the Hashtopus forums.
2. GPU Ocelot is a dead project, hasn't been touched in 4+ years (2.1 released Sept 2011)
3. OpenCL can already run on CPU, and if you're... |
|
epixoip |
User Contributions
|
1 |
5,252 |
01-13-2016, 02:43 AM |
|
|
Thread: Dictionary attack
Post: RE: Dictionary attack
combinator.bin rockyou.txt rockyou.txt >rockyou-combined.txt, then -a 6 rockyou-combined.txt ?d?d?d |
|
epixoip |
Old oclHashcat Support
|
3 |
5,240 |
01-23-2016, 10:22 AM |
|
|
Thread: Dictionary attack
Post: RE: Dictionary attack
You can use rockyou to build such a list, just filter out the words that are too long & too short:
Code:
--
awk 'length < 7 && length > 4' rockyou.txt >rockyou-5_6.txt
--
|
|
epixoip |
Old oclHashcat Support
|
3 |
5,240 |
01-23-2016, 11:10 PM |
|
|
Thread: Uknown Encrypted Archive
Post: RE: Uknown Encrypted Archive
Quote:
--
JTR and hashcat seem to run ok with the file but no idea if it is actually doing anything.
--
What does this mean? How are you attempting to crack it with hashcat? |
|
epixoip |
General Talk
|
4 |
5,239 |
05-30-2016, 04:50 AM |
|
|
Thread: Wordlist numeric mangling question
Post: RE: Wordlist numeric mangling question
No, this is not possible. Instead strip your wordlist down to basewords and do hybrid attacks. |
|
epixoip |
Old oclHashcat Support
|
2 |
5,228 |
11-20-2015, 06:18 AM |
|
|
Thread: Uncrackable hashes?
Post: RE: Uncrackable hashes?
more wordlists, more rules. |
|
epixoip |
Old hashcat Support
|
1 |
5,211 |
12-28-2013, 11:38 PM |
|
|
Thread: Set min brute force lengh
Post: RE: Set min brute force lengh
|
epixoip |
Old hashcat Support
|
1 |
5,202 |
10-14-2012, 03:32 AM |
|
|
Thread: need to plain text of wpa2
Post: RE: need to plain text of wpa2
It looks like he doesn't know the password, simply wants us to crack it for him since he doesn't have a GPU. Therefore, he gets the banhammer. |
|
epixoip |
Old hashcat Support
|
2 |
5,189 |
07-18-2015, 12:38 AM |
|
|
Thread: DES w/mask
Post: RE: DES w/mask
PASSLENGTH=6 means the password has to be a minimum of 6 chars. descrypt has a max of 8 chars, so the password could be 6, 7, or 8 chars long. Your mask only did length 6. You still have lengths 7 & 8... |
|
epixoip |
Old oclHashcat Support
|
3 |
5,189 |
10-24-2015, 02:10 AM |
|
|
Thread: DES w/mask
Post: RE: DES w/mask
|
epixoip |
Old oclHashcat Support
|
3 |
5,189 |
10-24-2015, 02:39 AM |
|
|
Thread: OCL throwing errors and works
Post: RE: OCL throwing errors and works
ADL is for temperature & fan speed monitoring, which is why you're seeing -1C temp and N/A fan. Does not impact cracking in any way. |
|
epixoip |
General Help
|
3 |
5,187 |
11-16-2015, 12:28 AM |
|
|
Thread: OCL throwing errors and works
Post: RE: OCL throwing errors and works
You have an R9 card which should probably be an Overdrive6 card, but it's not reporting that it's Overdrive6 capable, so oclHashcat is attempting to communicate with it via the Overdrive5 API, but tha... |
|
epixoip |
General Help
|
3 |
5,187 |
11-16-2015, 01:02 AM |
|
|
Thread: Parsed list
Post: RE: Parsed list
|
epixoip |
General Help
|
2 |
5,185 |
03-18-2015, 08:50 AM |
|
|
Thread: Regarding rli2.exe
Post: RE: Regarding rli2.exe
dude, just flip the arguments around... |
|
epixoip |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
5,175 |
01-13-2016, 08:23 AM |
|
|
Thread: SHA512 without salt
Post: RE: SHA512 without salt
Ok I did some digging into this one and was able to figure out what you've got.
My initial assumption was that the salt was null and that what you had was equivalent to "$6$rounds=5000$$", which assu... |
|
epixoip |
hashcat
|
4 |
5,167 |
06-29-2017, 11:00 PM |
|
|
Thread: SHA512 without salt
Post: RE: SHA512 without salt
Yeah, I'm going to open an issue for a few cases I ran into. Some quick examples:
When I input `$6$$rounds=5$gTCqLuWl...` hashcat turns it into `$6$$rounds65qgTCqLuWl...`
When I input `$6$rounds=500... |
|
epixoip |
hashcat
|
4 |
5,167 |
06-30-2017, 05:26 PM |
|
|
Thread: Technical explanation of why *explicitly* 13.1?
Post: RE: Technical explanation of why *explicitly* 13.1...
oclHashcat is not open source and thus ships pre-compiled kernels. The kernels are compiled for 13.1 and will not work with other versions. Although 13.4 seems to be close enough to 13.1 that a lot of... |
|
epixoip |
Very old oclHashcat-plus Support
|
1 |
5,160 |
05-12-2013, 06:33 AM |
|
|
Thread: Is correct these hash?
Post: RE: Is correct these hash?
Is the json you posted the request or the response? If it's the request, and that is indeed a hash of the password, then the password is being hashed client-side and you simply need to read the javasc... |
|
epixoip |
General Talk
|
5 |
5,152 |
01-22-2018, 06:37 AM |
|
|
Thread: Is correct these hash?
Post: RE: Is correct these hash?
Password hashing is typically done server-side, not client-side. Client-side hashing is uncommon. You should be seeing the plaintext password in transit. |
|
epixoip |
General Talk
|
5 |
5,152 |
01-23-2018, 02:24 PM |
|
|
Thread: Incremental Mask Attack
Post: RE: Incremental Mask Attack
You would use an hcmask file for that. |
|
epixoip |
Old hashcat Support
|
1 |
5,134 |
04-20-2016, 09:08 AM |