Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[desc]
|
|
|
Thread: GPU runing two of six why?
Post: RE: GPU runing two of six why?
you are using -D1 which means only CPU. |
|
undeath |
hashcat
|
4 |
4,143 |
03-15-2018, 10:45 PM |
|
|
Thread: GPU runing two of six why?
Post: RE: GPU runing two of six why?
scrypt is designed to be extremely slow on GPU so that result is expected. |
|
undeath |
hashcat
|
4 |
4,143 |
03-16-2018, 10:56 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
What do you mean by "unknown text"? What is the technical difference to a password? |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 10:59 AM |
|
|
Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys
what do you mean by "very low speed"? how do you measure it? |
|
undeath |
hashcat
|
3 |
3,323 |
03-16-2018, 11:02 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
isn't that just the same as hmac-sha1(key = $pass)?
edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt) |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:19 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
you should be able to crack this by using
dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160 |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:29 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 12:23 PM |
|
|
Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...
what walterlacka wrote. You are missing B in your custom charset. |
|
undeath |
hashcat
|
3 |
2,893 |
03-16-2018, 07:34 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
All your findings are correct. There is no "native" way to do such a mask attack. |
|
undeath |
hashcat
|
5 |
3,851 |
03-17-2018, 07:15 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix. |
|
undeath |
hashcat
|
5 |
3,851 |
03-18-2018, 10:38 AM |
|
|
Thread: fast way to crack
Post: RE: fast way to crack
https://hashcat.net/wiki/doku.php?id=mask_attack
But even with fast hardware a full brute-force is going to take ages on WPA. |
|
undeath |
hashcat
|
2 |
2,261 |
03-18-2018, 11:21 AM |
|
|
Thread: PMK???
Post: RE: PMK???
PMK is only useful if you need to attack the same SSID many times. Most people will never need this. |
|
undeath |
hashcat
|
2 |
2,309 |
03-18-2018, 11:23 AM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
1. that's not how custom charsets work
2. convert each letter in user to its ascii hex representation |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 02:27 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
A charset is, as the name implies, a set of chars. Defining a string as charset is not going to do what you want. |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 05:55 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
You can use the mask attack but you cannot specify the user in a custom charset. |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 06:27 PM |
|
|
Thread: please help me
Post: RE: please help me
Your commands are both correct. The first one is just missing the _ |
|
undeath |
hashcat
|
3 |
2,722 |
03-19-2018, 10:53 AM |
|
|
Thread: 7Zip Hash, missing SALT? (Salt-value exception)
Post: RE: 7Zip Hash, missing SALT? (Salt-value exception...
philsmd Wrote: (03-19-2018, 06:34 PM)
--
If you use the straight word list attack mode (-a 0) you also need to specify a dictionary file.
--
That's beside the point if the hash isn't loaded at all ... |
|
undeath |
hashcat
|
14 |
10,239 |
03-19-2018, 06:39 PM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
Such an attack mode is not implemented. You'd need to emulate it using custom generated mask files. |
|
undeath |
hashcat
|
5 |
4,178 |
03-19-2018, 07:35 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
just run hashcat64.exe --restore with no additional arguments |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:39 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
are you running the command in the same folder as you were running the attack in? |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:46 PM |