Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Nano Ledger S
Post: RE: Nano Ledger S
|
undeath |
General Talk
|
1 |
1,298 |
06-28-2019, 08:07 PM |
|
|
Thread: best approach?
Post: RE: best approach?
see https://hashcat.net/wiki/doku.php?id=mask_attack
but you will have to narrow down the possibilities. |
|
undeath |
General Talk
|
1 |
1,167 |
07-24-2019, 01:32 PM |
|
|
Thread: Determine if PKMID is dynamic?
Post: RE: Determine if PKMID is dynamic?
arniezonez Wrote: (08-14-2019, 04:55 PM)
--
Would the opengl self test failing be responsible for this?
--
LOL |
|
undeath |
General Talk
|
5 |
2,379 |
08-14-2019, 05:01 PM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
The LM hashes are only used by old versions of AD servers, which is why they are sometimes kept iirc. |
|
undeath |
General Talk
|
11 |
5,710 |
08-26-2019, 04:01 PM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
each NTLM hash should have two corresponding LM hashes, so you do not need to BF the second part of the password. |
|
undeath |
General Talk
|
11 |
5,710 |
08-27-2019, 10:14 AM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
exactly
It might be useful to convert the LM results to lower-case for that attack. You are likely to get hits a litte bit faster because passwords tend to mainly consist of lower case characters. |
|
undeath |
General Talk
|
11 |
5,710 |
08-27-2019, 04:23 PM |
|
|
Thread: Parsing and counting salts in hashlists
Post: RE: Parsing and counting salts in hashlists
There is no generic way of doing it. Various formats have their own representation and encoding. See https://hashcat.net/wiki/doku.php?id=example_hashes for some examples. |
|
undeath |
General Talk
|
2 |
1,189 |
09-20-2019, 12:57 PM |
|
|
Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $
PBKDF2-HMAC-SHA1 is supported by hashcat (mode 12000) |
|
undeath |
General Talk
|
4 |
1,671 |
09-24-2019, 11:39 PM |
|
|
Thread: Script or tool for hashing lines needed
Post: RE: Script or tool for hashing lines needed
|
undeath |
General Talk
|
4 |
1,596 |
09-25-2019, 09:31 PM |
|
|
Thread: PMKID
Post: RE: PMKID
I guess the question was meant to ask "why can you not use the PMKID to authenticate with a AP". Answer is simple: because the PMKID is not used in the WPA handshake. |
|
undeath |
General Talk
|
2 |
1,511 |
10-04-2019, 07:21 PM |
|
|
Thread: Best way to crack emails?
Post: RE: Best way to crack emails?
convert your email appendixes to a rules file and do a straight wordlist + rules attack. |
|
undeath |
General Talk
|
3 |
1,906 |
10-06-2019, 11:31 AM |
|
|
Thread: Best way to crack emails?
Post: RE: Best way to crack emails?
yes. And then you can apply additional rules to whatever input wordlist/username list you use before that final domain ruleset. |
|
undeath |
General Talk
|
3 |
1,906 |
10-07-2019, 11:28 AM |
|
|
Thread: Hash of office file need to be cracked.
Post: RE: Hash of office file need to be cracked.
you forgot to specify a wordlist |
|
undeath |
General Talk
|
1 |
1,161 |
10-07-2019, 06:11 PM |
|
|
Thread: Decoding multiple PMKID SSIDs
Post: RE: Decoding multiple PMKID SSIDs
wlanhcxinfo of https://github.com/ZerBea/hcxtools should be able to do all you need. |
|
undeath |
General Talk
|
4 |
2,073 |
10-13-2019, 12:07 PM |
|
|
Thread: WPA help
Post: RE: WPA help
standard wpa(2) is mode 2500. Unless you know what PMK or PMKID means you don't need them. |
|
undeath |
General Talk
|
1 |
978 |
12-11-2019, 01:00 AM |
|
|
Thread: Save mask in wordlist
Post: RE: Save mask in wordlist
hashcat -a3 PAS?dWOR?d --stdout > list.txt |
|
undeath |
General Talk
|
1 |
929 |
01-03-2020, 10:41 PM |
|
|
Thread: Dictionary Attack
Post: RE: Dictionary Attack
rockyou is a good wordlist but you should add rules. Hashcat ships a bunch. There is no way to guarantee cracking a hash though. |
|
undeath |
General Talk
|
3 |
1,523 |
01-05-2020, 01:09 PM |
|
|
Thread: Can this password type be brute forced?
Post: RE: Can this password type be brute forced?
Assuming a theoretical hash rate of 1 TH/s (which is already very fast, even for a fast hash mode) you'd be looking at about 10^43 years of cracking. Pretty sure that's well beyond the expected end of... |
|
undeath |
General Talk
|
2 |
1,226 |
01-10-2020, 01:08 PM |
|
|
Thread: Help with cracking a password to a PDF
Post: RE: Help with cracking a password to a PDF
hashcat does not use rainbow tables. And besides, I have no idea how your md5 is related to the pdf mentioned in the thread title. |
|
undeath |
General Talk
|
2 |
1,069 |
02-16-2020, 02:08 PM |
|
|
Thread: Optimizing WPA recovery
Post: RE: Optimizing WPA recovery
you can simply concatenate hccapx files |
|
undeath |
General Talk
|
4 |
1,529 |
02-20-2020, 06:10 PM |