Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Hashing is 1/6th the speed of benchmarking
Post: RE: Hashing is 1/6th the speed of benchmarking
wordlist is (almost) always slower than bf. Additionally 7zip may have been using slightly different settings. I'm not sure what kind of variables the algorithms allows. |
|
undeath |
hashcat
|
2 |
2,485 |
03-21-2018, 10:28 AM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
No, using increment would only be possible if your variable part is at the end. |
|
undeath |
hashcat
|
5 |
4,178 |
03-20-2018, 04:59 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
are you running the command in the same folder as you were running the attack in? |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:46 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
just run hashcat64.exe --restore with no additional arguments |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:39 PM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
Such an attack mode is not implemented. You'd need to emulate it using custom generated mask files. |
|
undeath |
hashcat
|
5 |
4,178 |
03-19-2018, 07:35 PM |
|
|
Thread: 7Zip Hash, missing SALT? (Salt-value exception)
Post: RE: 7Zip Hash, missing SALT? (Salt-value exception...
philsmd Wrote: (03-19-2018, 06:34 PM)
--
If you use the straight word list attack mode (-a 0) you also need to specify a dictionary file.
--
That's beside the point if the hash isn't loaded at all ... |
|
undeath |
hashcat
|
14 |
10,239 |
03-19-2018, 06:39 PM |
|
|
Thread: please help me
Post: RE: please help me
Your commands are both correct. The first one is just missing the _ |
|
undeath |
hashcat
|
3 |
2,722 |
03-19-2018, 10:53 AM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
You can use the mask attack but you cannot specify the user in a custom charset. |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 06:27 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
A charset is, as the name implies, a set of chars. Defining a string as charset is not going to do what you want. |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 05:55 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
1. that's not how custom charsets work
2. convert each letter in user to its ascii hex representation |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 02:27 PM |
|
|
Thread: PMK???
Post: RE: PMK???
PMK is only useful if you need to attack the same SSID many times. Most people will never need this. |
|
undeath |
hashcat
|
2 |
2,309 |
03-18-2018, 11:23 AM |
|
|
Thread: fast way to crack
Post: RE: fast way to crack
https://hashcat.net/wiki/doku.php?id=mask_attack
But even with fast hardware a full brute-force is going to take ages on WPA. |
|
undeath |
hashcat
|
2 |
2,261 |
03-18-2018, 11:21 AM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix. |
|
undeath |
hashcat
|
5 |
3,851 |
03-18-2018, 10:38 AM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
All your findings are correct. There is no "native" way to do such a mask attack. |
|
undeath |
hashcat
|
5 |
3,851 |
03-17-2018, 07:15 PM |
|
|
Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...
what walterlacka wrote. You are missing B in your custom charset. |
|
undeath |
hashcat
|
3 |
2,893 |
03-16-2018, 07:34 PM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 12:23 PM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
you should be able to crack this by using
dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160 |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:29 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
isn't that just the same as hmac-sha1(key = $pass)?
edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt) |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:19 AM |
|
|
Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys
what do you mean by "very low speed"? how do you measure it? |
|
undeath |
hashcat
|
3 |
3,323 |
03-16-2018, 11:02 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
What do you mean by "unknown text"? What is the technical difference to a password? |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 10:59 AM |