Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file.
CracktainCrunch Wrote: (07-07-2020, 08:24 PM)
--
I u... |
|
undeath |
General Talk
|
10 |
2,057 |
07-08-2020, 08:29 PM |
|
|
Thread: Upgraded to v6.0.0 now Illegal instruction error
Post: RE: Upgraded to v6.0.0 now Illegal instruction err...
Why are you not running hashcat on your windows system? |
|
undeath |
hashcat
|
3 |
695 |
07-07-2020, 06:51 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-07-2020, 01:21 AM)
--
It would essentially be a brute force attack but with pre-generated passwords that one would use in a dict attack I guess.
--
I'm not sure what brou... |
|
undeath |
General Talk
|
10 |
2,057 |
07-07-2020, 10:02 AM |
|
|
Thread: Anyone with a amd/radeon GPU rig running on linux?
Post: RE: Anyone with a amd/radeon GPU rig running on li...
You should see no issues using rocm on linux. |
|
undeath |
hashcat
|
5 |
1,000 |
07-06-2020, 03:28 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-06-2020, 12:00 PM)
--
Like taking already cracked passwords that were randomly generated and jumble them up or something like that?
--
That's what rule-based attacks do (... |
|
undeath |
General Talk
|
10 |
2,057 |
07-06-2020, 03:25 PM |
|
|
Thread: Rules in 16800 don't work?
Post: RE: Rules in 16800 don't work?
Yes, without using -S words from your wordlist shorter than eight bytes will be rejected. |
|
undeath |
General Talk
|
8 |
1,336 |
06-30-2020, 11:13 PM |
|
|
Thread: Rules in 16800 don't work?
Post: RE: Rules in 16800 don't work?
I expect your password is not actually WORD123 but something different. Because WORD123 is only seven characters and thus not a valid WPA2 password.
WPA2 has a minimum password length of eight char... |
|
undeath |
General Talk
|
8 |
1,336 |
06-30-2020, 10:07 AM |
|
|
Thread: ESSID:key available lists?
Post: RE: ESSID:key available lists?
See https://hashcat.net/forum/thread-6170.html
Given that default passwords for wpa routers are usually generated using some pseudo-random hashing function I wouldn't expect an AI to create much us... |
|
undeath |
hashcat
|
6 |
1,103 |
06-28-2020, 03:40 PM |
|
|
Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs
Hashcat requires good integer performance. Developer cards usually only boost floating point performance, sometimes even at the cost of integer performance. Consumer GPUs are what work best for hashca... |
|
undeath |
Hardware
|
6 |
1,395 |
06-26-2020, 11:01 PM |
|
|
Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs
I don't know what made you think developer GPUs are superior for hashcracking. They aren't. |
|
undeath |
Hardware
|
6 |
1,395 |
06-26-2020, 03:59 PM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
led5150 Wrote: (06-25-2020, 01:20 AM)
--
Funny enough, it does find it without the -O flag. Would it be safe/reliable to use without it?
--
Unfortunately that's not safe to say. Fact is, there is... |
|
undeath |
hashcat
|
8 |
1,277 |
06-26-2020, 03:17 PM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
-O is using a different kernel that has some optimizations and should run faster but only works for passwords up to a certain length (depending on the specific hashing function). This length is usuall... |
|
undeath |
hashcat
|
8 |
1,277 |
06-24-2020, 12:29 PM |
|
|
Thread: When should I start with my hashcat experiment
Post: RE: When should I start with my hashcat experiment
i would wait at least two or three. |
|
undeath |
Hardware
|
6 |
1,134 |
06-22-2020, 06:41 PM |
|
|
Thread: False Positives
Post: RE: False Positives
If 25-fghaghaglhfalgh and 2-fglhasdfhladd create the same hash it might. Otherwise it is a bug. |
|
undeath |
hashcat
|
3 |
652 |
06-22-2020, 06:41 PM |
|
|
Thread: Generator of fortune
Post: RE: Generator of fortune
owein Wrote: (06-18-2020, 05:20 PM)
--
Back to the administrators: please unblock thus thread.
--
this thread is neither locked nor hidden nor anything similar. |
|
undeath |
User Contributions
|
8 |
2,015 |
06-19-2020, 02:01 AM |
|
|
Thread: Blockchain Wallet
Post: RE: Blockchain Wallet
hashcat cannot be used to attack websites. |
|
undeath |
hashcat
|
6 |
1,270 |
06-19-2020, 01:57 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
If your password is truely 18 chars and you don't remember anything useful about it, give up. |
|
undeath |
General Talk
|
10 |
2,583 |
06-18-2020, 11:18 PM |
|
|
Thread: €-Symbol with Command ?b
Post: RE: €-Symbol with Command ?b
You can use the MD4 hash mode to crack your hash:
Code:
--
./hashcat -m900 030926B781938DB4365D46ADC7CFBCB8 euro.txt --encoding-from=utf8 --encoding-to=utf16le
--
|
|
undeath |
hashcat
|
4 |
804 |
06-16-2020, 08:41 PM |
|
|
Thread: €-Symbol with Command ?b
Post: RE: €-Symbol with Command ?b
First, € is a utf-8 multibyte symbol and cannot be cracked on any hash mode with ?b. You'd need to use ?b?b?b. Second, NTLM uses utf-16 and hashcat does some very naive charset conversion that can o... |
|
undeath |
hashcat
|
4 |
804 |
06-16-2020, 08:36 PM |
|
|
Thread: hashcat 6.0.0
Post: RE: hashcat 6.0.0
Whooo, it's official finally! So many things happened since the last release! |
|
undeath |
hashcat
|
21 |
87,676 |
06-16-2020, 06:37 PM |