Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [desc]
    Thread: NTLM vs WPA/WPA2 cracking
Post: NTLM vs WPA/WPA2 cracking

Is there an intentional difference between how hashcat performs a dictionary + rule attack against NTLM vs WPA/WPA2? While testing different dictionary and rule combinations against a set of test p...
mtnsec hashcat 19 9,917 08-30-2018, 06:28 PM
    Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking

philsmd Wrote: (08-30-2018, 07:25 PM) -- you could use pipes or -j to modify the password earlier on to test if the same problem happens with base passwords that are already long enough -- These ar...
mtnsec hashcat 19 9,917 08-30-2018, 07:46 PM
    Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking

Thanks for your help! I was able to confirm that it does appear to be skipping dictionary words less than 8 characters, even when rules would prepend/append enough characters to create a 8+ character ...
mtnsec hashcat 19 9,917 08-30-2018, 08:38 PM
    Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking

Anyone have any ideas or workarounds for this limitation? As it stands, this means we can't use a rules based attack to crack any of the simplest/lowest hanging fruit such as: Spring2018 Hello123...
mtnsec hashcat 19 9,917 08-31-2018, 05:23 PM
    Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking

Thanks for the quick response philsmd! Unfortunately, stdin does not appear to bypass the character limitation. Using a dictionary of just 3 words (all less than 8 characters) results in a very quick ...
mtnsec hashcat 19 9,917 08-31-2018, 09:08 PM
    Thread: Multiple hashes for the same user (WPA, PMKID, NetNTLMv2)
Post: Multiple hashes for the same user (WPA, PMKID, Net...

Hello! I'm running into another issue/question about what I need to crack. I have collected several WPA handshakes, PMKIDs and NetNTLMv2 challenge/response pairs. Many of these are duplicates...
mtnsec hashcat 2 2,328 12-07-2018, 05:26 PM
    Thread: Multiple hashes for the same user (WPA, PMKID, NetNTLMv2)
Post: RE: Multiple hashes for the same user (WPA, PMKID,...

undeath Wrote: (12-07-2018, 05:37 PM) -- Especially with WPA there is a chance of transmission errors. For other hash types less so. -- Thank you!
mtnsec hashcat 2 2,328 12-07-2018, 05:42 PM
    Thread: Mask attack with brain
Post: Mask attack with brain

Curious why my mask attack slows down from a few seconds, to 15+ hours when I try to use the brain.  I"m also noticing that my candidates show the hex value instead of the actual candidate.  For exa...
mtnsec hashcat 5 3,629 12-08-2018, 02:44 AM
    Thread: Mask attack with brain
Post: RE: Mask attack with brain

Thanks! That makes sense! However, I'm not seeing any change when using -2. It's still a whole lot slower, and my candidates are all hex encoded.. :(
mtnsec hashcat 5 3,629 12-08-2018, 04:14 AM
    Thread: Mask attack with brain
Post: RE: Mask attack with brain

undeath Wrote: (12-08-2018, 02:21 PM) -- What's your whole command line? -- Originally I was using: sudo hashcat -z --brain-password --brain-client-features 1 -a 3 -m 5500 -O hash.txt maskfile....
mtnsec hashcat 5 3,629 12-08-2018, 07:27 PM
    Thread: Brain as a centralized potfile?
Post: Brain as a centralized potfile?

I'm still trying to understand the brain, so hopefully this question makes sense: Looking at the features: - [ Brain Client Features ] -  # | Features ===+========  1 | Send hashed pas...
mtnsec hashcat 3 2,089 12-16-2018, 09:09 PM
    Thread: Parsing a Potfile
Post: RE: Parsing a Potfile

? $ cat hashcat.potfile | sed 's/[^:]*://'
mtnsec hashcat 5 3,827 12-18-2018, 08:00 PM
    Thread: Brain as a centralized potfile?
Post: RE: Brain as a centralized potfile?

Thanks!
mtnsec hashcat 3 2,089 12-18-2018, 08:01 PM