Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Combinator help
Post: RE: Combinator help
why are you even trying to use -a 6? That's a completely different attack mode. Use -a 0 and pipe in princeprocessor. |
|
undeath |
hashcat
|
3 |
3,013 |
11-19-2018, 12:04 PM |
|
|
Thread: BRAIINNN show password? :)
Post: RE: BRAIINNN show password? :)
Brain only helps coordinating attacks among several hashcat instances (whether run sequentially or parallelly). It does not record cracked passwords. You need to check the individual instances for tha... |
|
undeath |
General Talk
|
1 |
1,709 |
11-11-2018, 12:33 PM |
|
|
Thread: backslash(\) slow down md5 speed
Post: RE: backslash(\) slow down md5 speed
Static prefixes in a mask attack slow down the attack, that's a known limitation in hashcat. Avoid static prefixes if possible and try to change your attack. |
|
undeath |
General Talk
|
2 |
2,317 |
11-11-2018, 02:21 AM |
|
|
Thread: Brain working slow!!!
Post: RE: Brain working slow!!!
you should read https://hashcat.net/forum/thread-7903.html |
|
undeath |
General Talk
|
4 |
3,284 |
11-11-2018, 02:04 AM |
|
|
Thread: Brain socket error
Post: RE: Brain socket error
use the beta version: https://hashcat.net/beta/
known (and fixed) problem on windows |
|
undeath |
General Talk
|
1 |
1,911 |
11-11-2018, 12:22 AM |
|
|
Thread: md5($salt1,password,$salt2) ?
Post: RE: md5($salt1,password,$salt2) ?
Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule. |
|
undeath |
hashcat
|
5 |
3,104 |
11-09-2018, 12:20 PM |
|
|
Thread: Salt input and bruteforcing
Post: RE: Salt input and bruteforcing
is the "number(1 to 9).1234567890876543" part fixed? If so you should add it to the salt. You don't need to define ?1 for a single character. You can simply use that character in the mask. |
|
undeath |
hashcat
|
3 |
2,136 |
11-09-2018, 12:17 PM |
|
|
Thread: 2 computers
Post: RE: 2 computers
I'm not sure if brain would be too slow and limited for WPA. Especially assuming he's using a standard consumer pc with |
|
undeath |
General Talk
|
5 |
4,235 |
11-09-2018, 12:14 PM |
|
|
Thread: OpenCL problem
Post: RE: OpenCL problem
don't run hashcat in a VM |
|
undeath |
hashcat
|
5 |
6,486 |
11-06-2018, 10:39 AM |
|
|
Thread: hashcat v5.0.0
Post: RE: hashcat v5.0.0
see "Commandline Options" in the first post… |
|
undeath |
hashcat
|
11 |
50,025 |
11-05-2018, 02:56 PM |
|
|
Thread: How to crack custom hash - SHA512, SHA256, and MD5 combined
Post: RE: How to crack custom hash - SHA512, SHA256, and...
You'd have to write your own kernel for that. |
|
undeath |
hashcat
|
3 |
3,429 |
11-04-2018, 11:31 PM |
|
|
Thread: recovering Idrac password
Post: RE: recovering Idrac password
If you had posted the plaintext as requested it had been easier to help you. You need to add --hex-salt |
|
undeath |
hashcat
|
4 |
2,694 |
11-04-2018, 12:57 PM |
|
|
Thread: recovering Idrac password
Post: RE: recovering Idrac password
what is your password? how did you generate the hash? |
|
undeath |
hashcat
|
4 |
2,694 |
11-04-2018, 12:35 PM |
|
|
Thread: Need assistance with creating a specific rule
Post: RE: Need assistance with creating a specific rule
generate a rule file to insert the numbers/specials into the aaaAAA candidates, generated externally and piped into hashcat in stdin mode. |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
2,353 |
11-02-2018, 12:57 AM |
|
|
Thread: brain-server
Post: RE: brain-server
hashcat --brain-server
for more info see https://hashcat.net/forum/thread-7903.html |
|
undeath |
hashcat
|
4 |
4,680 |
11-02-2018, 12:52 AM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Well, remove --force and see what problems hashcat reports and fix them?! |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 10:20 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Don't use --force and report resulting problems on here. Fix your problems. |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 12:34 PM |
|
|
Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed
You can learn hashcat's functionality much better by just using the command line and built it yourself using the information on --help |
|
undeath |
hashcat
|
4 |
2,788 |
10-31-2018, 12:33 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
hashcat doesn't magically find the file for you on your system. Give the full path if it's not in your cwd.
What does this have to do with /etc/shadow at all? |
|
undeath |
hashcat
|
12 |
7,528 |
10-30-2018, 09:18 PM |
|
|
Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat
Either you implement a kernel on your own for such a hash mode or you do the encoding externally and pipe in the already base64-encoded words in a0 mode, but this will cost quite some performance and ... |
|
undeath |
hashcat
|
3 |
2,375 |
10-30-2018, 09:42 AM |