Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: beginner help, best method?
Post: RE: beginner help, best method?
No reason to use maskprocessor for such a simple mask attack. WPA is a rather slow hash mode and nine characters is rather long for a brute force. Find more clever attacks or die cracking. |
|
undeath |
hashcat
|
6 |
3,771 |
05-12-2018, 11:34 AM |
|
|
Thread: Hashcat 4.1.0 slow speed
Post: RE: Hashcat 4.1.0 slow speed
static mask prefix is bad for performance |
|
undeath |
hashcat
|
6 |
3,903 |
05-12-2018, 11:30 AM |
|
|
Thread: Hashcat piping doesn't work (WPA/2)
Post: RE: Hashcat piping doesn't work (WPA/2)
Are you able to crack the password using a different method than piping? mask attack, normal wordlist attack, … |
|
undeath |
User Contributions
|
4 |
6,411 |
05-11-2018, 11:28 AM |
|
|
Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...
yes, the password length in combination with "brute force" |
|
undeath |
Hardware
|
10 |
8,020 |
05-08-2018, 09:59 PM |
|
|
Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...
I'd invest in a simple calculator. |
|
undeath |
Hardware
|
10 |
8,020 |
05-08-2018, 09:54 PM |
|
|
Thread: Tesla P100 / HC 4.1.0 Benchmarks on Google Cloud
Post: RE: Tesla P100 / HC 4.1.0 Benchmarks on Google Clo...
In all the benchmark numbers you have posted, were you using the same hash or different hashes? |
|
undeath |
Hardware
|
5 |
6,941 |
05-08-2018, 11:10 AM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
efficient attack, ugly edition:
combine salt with each dict word and run -a3 with the mask only
alternatively use --stdout and simply pipe in the -a6 candidates. You don't have proper status but it's... |
|
undeath |
hashcat
|
5 |
3,426 |
05-07-2018, 09:26 PM |
|
|
Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working
Your nvidia opencl runtime, not your intel one. Try reinstalling the graphics driver. |
|
undeath |
hashcat
|
4 |
3,114 |
05-07-2018, 07:24 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
dict is too small. You might need to do this attack differently. |
|
undeath |
hashcat
|
5 |
3,426 |
05-07-2018, 07:23 PM |
|
|
Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working
sounds like a broken opencl runtime. Does the same happen without -t option? |
|
undeath |
hashcat
|
4 |
3,114 |
05-07-2018, 05:20 PM |
|
|
Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM
@ktinoulas: you are talking about an early-reject in the 5500 kernel. Looks like this is already implemented: https://github.com/hashcat/hashcat/blob/f6cfcbbc3a37e9b0ef9448f7d70f9013b65bd027/OpenCL/m0... |
|
undeath |
User Contributions
|
18 |
36,659 |
05-07-2018, 05:13 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
It could also be some custom scheme. There is an unlimited number of ways to do salted iterated hashing. |
|
undeath |
hashcat
|
5 |
5,007 |
05-01-2018, 03:50 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
first you need to find out how exactly the hash is generated |
|
undeath |
hashcat
|
5 |
5,007 |
05-01-2018, 03:30 PM |
|
|
Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem
A fundamental feature of a cryptographic hash function is that this is not possible. So no. |
|
undeath |
hashcat
|
3 |
2,661 |
04-30-2018, 09:06 PM |
|
|
Thread: Can anyone help me
Post: RE: Can anyone help me
you haven't happened to follow the suggestions hashcat gave you, have you?
Quote:
--
You are STRONGLY encouraged to use the drivers listed in docs/readme.txt.
--
|
|
undeath |
hashcat
|
3 |
3,116 |
04-27-2018, 06:13 PM |
|
|
Thread: Line-length exception
Post: RE: Line-length exception
hashcat cannot find your hash file. |
|
undeath |
hashcat
|
2 |
2,006 |
04-26-2018, 11:45 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
targeted wordlists, targeted rules, more narrow masks, … |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:24 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4
Other than that the most time you can save by running clever attacks. |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 05:59 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 01:06 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
how did you create the hash? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 12:05 PM |