Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: double md5 not working
Post: RE: double md5 not working
damn, forgot to upgrade my drivers :/ Thank you. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
6,110 |
09-18-2012, 09:26 PM |
|
|
Thread: double md5 not working
Post: double md5 not working
Double md5 (2600) does not seem to work for me using latest plus version.
No matter what ruleset and wordlist i use, there are 0 cracks. Used the cpu version and had multiple cracks with the same r... |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
6,110 |
09-18-2012, 09:20 PM |
|
|
Thread: charset and unicode
Post: RE: charset and unicode
shouldn't utf-8 work just as fine as ascii? Default garbage in, garbage out mentality? |
|
undeath |
Very old oclHashcat-plus Support
|
7 |
13,062 |
09-16-2012, 12:38 PM |
|
|
Thread: hashcat working on by far more passwords than wordlist
Post: RE: hashcat working on by far more passwords than ...
post the command line or a screenshot of the gui with all your options. |
|
undeath |
Very old oclHashcat-plus Support
|
4 |
9,238 |
09-08-2012, 11:08 AM |
|
|
Thread: Two Question about bruteforce password vbb
Post: RE: Two Question about bruteforce password vbb
1. because you are an incompetent scripting kiddy.
2. the mask has to be at least the length to be bruteforced at maximum, say 10 times ?l for a 10 char password |
|
undeath |
Old hashcat Support
|
4 |
9,607 |
08-20-2012, 07:26 PM |
|
|
Thread: MD5(salt.pass)
Post: RE: MD5(salt.pass)
for GPU cracking you can try OSC, but it is probably limited to two character salts. |
|
undeath |
General Help
|
7 |
20,325 |
08-16-2012, 01:55 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e... |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:53 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4. |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:50 AM |
|
|
Thread: Error when cracking Domain Cashed Credentials - ms-cache
Post: RE: Error when cracking Domain Cashed Credentials ...
mscash is salted by the username. you need to supply hash:username |
|
undeath |
General Help
|
2 |
17,416 |
08-08-2012, 03:24 PM |
|
|
Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?
if you only need to store user passwords, store a base64 encoded string of the hash. |
|
undeath |
General Talk
|
5 |
15,747 |
08-07-2012, 07:45 PM |
|
|
Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me
|
undeath |
Very old oclHashcat-plus Support
|
14 |
19,507 |
08-06-2012, 06:18 PM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
OSC is md5(salt.pass), however it is not supported by lite. Read my other post. |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,862 |
08-06-2012, 01:58 AM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
uhm, sorry. Seems like OSC is not supported by lite. Due to the way lite works you should not use a mask like 12345678?1?1?1?1 ... because lite relies on the first part of the plaintext not to be fixe... |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,862 |
08-06-2012, 01:26 AM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
you can try the OSC hash mode. |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,862 |
08-06-2012, 12:59 AM |
|
|
Thread: Seperator unmatched error
Post: RE: Seperator unmatched error
there is obviously no salt supplied. Also your "sha1" hash is 24bytes long, not 20 like it is supposed to be. |
|
undeath |
Old hashcat Support
|
1 |
6,301 |
08-05-2012, 05:46 PM |
|
|
Thread: SHA1 Customized Algorithm
Post: RE: SHA1 Customized Algorithm
save the hashes as
hash:USER:
(notice the trailing colon)
and use a rule to ensure every password is only tested in upper case.
then you can use sha1(salt.pass) |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
11,207 |
08-03-2012, 01:06 PM |
|
|
Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me
Code:
--
8--gpu-loops 256
--
you are missing a blank and you are still missing a mask |
|
undeath |
Very old oclHashcat-plus Support
|
14 |
19,507 |
08-02-2012, 11:18 PM |
|
|
Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me
you did not specify a mask. Also you have to quote your hash file. |
|
undeath |
Very old oclHashcat-plus Support
|
14 |
19,507 |
08-01-2012, 11:20 PM |
|
|
Thread: Restructuring pot file
Post: RE: Restructuring pot file
yes, that would be a nicely working solution, too! |
|
undeath |
Feature Requests
|
4 |
9,885 |
07-31-2012, 04:40 PM |
|
|
Thread: Restructuring pot file
Post: RE: Restructuring pot file
With the current pot file you cannot tell apart salt from plain if the salt contains a colon. If you prepend the salt to the hash you can easily make a regex to find the plain. ^.*\$[0-9a-f]{32,}:(?P.... |
|
undeath |
Feature Requests
|
4 |
9,885 |
07-31-2012, 04:03 PM |