Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: AMD Radeon VII benchmarks(?)
Post: RE: AMD Radeon VII benchmarks(?)
The problem is not with your benchmark command but with the post I think. It's cut off in the middle during the Truecrypt benchmarks. Or did hashcat crash at that point? |
|
undeath |
Hardware
|
17 |
12,532 |
02-12-2019, 04:46 PM |
|
|
Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example
Post: RE: Help explain the PBKDF2-HMAC-SHA1 hash-example
|
undeath |
hashcat
|
4 |
2,619 |
02-11-2019, 09:46 PM |
|
|
Thread: Locating bottleneck in Brain
Post: RE: Locating bottleneck in Brain
Have you checked how saturated your network is? |
|
undeath |
hashcat
|
7 |
4,570 |
02-11-2019, 03:56 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
edit: ninja'd
Yes, the speed difference is because that's just how hashcat works and for fast hashes there is no good workaround. You may be able to achieve slightly better speed by using a0 with rul... |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 03:12 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
The left side of an attack has a higher impact on the performance than the right side. Since your left side for a7 only has 95 items you get worse performance than with the huge wordlist on a6. This i... |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 02:45 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
I'm not implying anything, it's explained right in that FAQ article. Your mask is too small to be a useful amplifier for a very fast hash type like NTLM. |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 01:48 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
https://hashcat.net/faq/morework |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 11:30 AM |
|
|
Thread: problems with -m 15700
Post: RE: problems with -m 15700
Try using the slow candidates mode (-S)
Hashcat isn't optimised for handling such small wordlists. |
|
undeath |
hashcat
|
5 |
2,794 |
02-08-2019, 03:36 PM |
|
|
Thread: Decrypt PGP encryption (Symantec).
Post: RE: Decrypt PGP encryption (Symantec).
the software you are asking about is not supported by hashcat. |
|
undeath |
hashcat
|
6 |
3,684 |
02-07-2019, 11:52 PM |
|
|
Thread: Decrypt PGP encryption (Symantec).
Post: RE: Decrypt PGP encryption (Symantec).
not supported. btw, hashcat can help with recovering a password but not decrypt anything. |
|
undeath |
hashcat
|
6 |
3,684 |
02-07-2019, 08:24 PM |
|
|
Thread: hashcat dictionary issues
Post: RE: hashcat dictionary issues
maybe your split.exe has some bug. Try using gate from https://github.com/hashcat/hashcat-utils
or maybe your original wordlist contains some large chunks of garbage. |
|
undeath |
hashcat
|
4 |
2,220 |
02-05-2019, 09:23 PM |
|
|
Thread: hashcat dictionary issues
Post: RE: hashcat dictionary issues
your dictionary cache says "Passwords: 1" so it looks like the wordlist file is broken. |
|
undeath |
hashcat
|
4 |
2,220 |
02-05-2019, 08:42 PM |
|
|
Thread: where can i find an Compatible GUI for hashcat v.4.2.1 ?
Post: RE: where can i find an Compatible GUI for hashcat...
|
undeath |
General Talk
|
6 |
3,541 |
02-04-2019, 01:31 AM |
|
|
Thread: Rejecting candidates under X characters while using rules set?
Post: RE: Rejecting candidates under X characters while ...
Use -O which will reject all candidates longer than 15 characters. Using other mechanisms to reject candidates will likely slow down the attack more than just trying them anyway. Afterwards you can st... |
|
undeath |
hashcat
|
5 |
3,365 |
02-03-2019, 09:40 PM |
|
|
Thread: Need help working with masks
Post: RE: Need help working with masks
you are mixing up masks and rules in a really weird way. This is what masks look like: https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
5 |
2,537 |
02-03-2019, 03:29 PM |
|
|
Thread: new user in need of help with command line
Post: RE: new user in need of help with command line
you're better off using https://github.com/ryancdotorg/brainflayer |
|
undeath |
hashcat
|
2 |
1,883 |
02-03-2019, 12:06 AM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
Unless you are some kind of divine being there is no use in such an attack. It will surpass the estimated end of our universe. |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 06:41 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
well, you have to start hashcat correctly. Your arguments are out of order. |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 05:19 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
windows uses two LM hashes to store such long passwords. |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 03:44 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
hashcatlinux Wrote: (02-02-2019, 02:39 PM)
--
Code:
--
hashcat -m 3000 -a 3 -1 ?l?d?s?u -2 ?l?d?s?u ?1?1?1?1?1?1?1?1?1?1?1?1?1?1 hashes.txt
zsh: no matches found: ?l?d?s?u
--
--
Learn how your s... |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 02:58 PM |