Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: USER:HASH
Post: RE: USER:HASH
|
undeath |
hashcat
|
8 |
6,548 |
02-04-2018, 10:34 PM |
|
|
Thread: combinator + rule
Post: RE: combinator + rule
-j/-k only accept a single rule, not files |
|
undeath |
hashcat
|
6 |
6,142 |
02-05-2018, 12:20 AM |
|
|
Thread: How to change password length (min/max)
Post: RE: How to change password length (min/max)
The min 0, max 256 is just technical information and not directly related to the actual password candidates processed.
Regarding the creation of masks see the wiki article: https://hashcat.net/wiki... |
|
undeath |
hashcat
|
4 |
9,653 |
02-06-2018, 01:44 PM |
|
|
Thread: Truecrypt 4.3 Volume
Post: RE: Truecrypt 4.3 Volume
as far as I can tell only TC >= 5.0 is supported. |
|
undeath |
hashcat
|
1 |
1,856 |
02-06-2018, 01:47 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
Shouldn't hashcat check if the pid from hashcat.pid does actually belong to a running process? |
|
undeath |
hashcat
|
7 |
10,362 |
02-06-2018, 08:44 PM |
|
|
Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password
hashcat can only be used to recover the password of an encrypted pdf document. There are other tools that can remove restrictions from pdf files without cracking the password. |
|
undeath |
hashcat
|
10 |
8,001 |
02-08-2018, 07:26 PM |
|
|
Thread: Itunes
Post: RE: itunes bis
please post the full output |
|
undeath |
hashcat
|
4 |
3,249 |
02-09-2018, 10:28 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
this worked
./hashcat64.bin -m4800 -a3 777f2a3f6a2e661947b520c6777e0b25:45c915d82d67257209048420a31292d3:00 password |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:30 AM |
|
|
Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat
https://hashcat.net/wiki/doku.php?id=example_hashes |
|
undeath |
hashcat
|
10 |
8,863 |
02-10-2018, 02:13 PM |
|
|
Thread: Rules rules rules!
Post: RE: Rules rules rules!
for a start, here is the article about rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack
The rules you need to accomplish what you are looking for arethe insert rule (i)
the prepend rule... |
|
undeath |
hashcat
|
3 |
2,929 |
02-10-2018, 02:52 PM |
|
|
Thread: Rules rules rules!
Post: RE: Rules rules rules!
Well, that will mostly depend on the size of your wordlist. Assuming passwords of up to 10 characters (before rules), you have
[positions of LAD]*[positions of BYE]*[possibilities for m@1d]*[positi... |
|
undeath |
hashcat
|
3 |
2,929 |
02-10-2018, 07:10 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
hashcat runs on any device supporting opencl, which includes modern CPUs and GPUs. You just need to install the correct opencl runtime for the device.
If you want others to help you with cracking y... |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:20 PM |
|
|
Thread: Mask attack help
Post: RE: Mask attack help
zap44 Wrote: (02-11-2018, 01:04 AM)
--
Based on my limited knowledge, I know that the password is in the range of 60521739 -> 67646497 from the information above.
--
Wrong. Based on the information... |
|
undeath |
hashcat
|
5 |
6,232 |
02-11-2018, 01:09 AM |
|
|
Thread: --stdout combinator attack
Post: RE: --stdout combinator attack
alternatively you can use combinator from hashcat-utils |
|
undeath |
hashcat
|
2 |
2,402 |
02-11-2018, 12:53 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
unless there is a different way to check if the seed has been successfully decrypted other than the keccak hashing mentioned by philsmd above it's impossible to retrieve the password using the first 8... |
|
undeath |
hashcat
|
26 |
24,603 |
02-11-2018, 02:12 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
philsmd Wrote: (02-11-2018, 02:24 PM)
--
I'm almost 100% sure, that such a technique where somebody can recover a very long random seed by just having 80-bytes of the encrypted seed is currently infe... |
|
undeath |
hashcat
|
26 |
24,603 |
02-11-2018, 02:36 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 12:48 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
yes, the challenge is required in order to crack the hash. |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:01 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
I don't know how the CHAP handshake works but I would expect you can still crack a hash with a wrong password. The challenge should still be transmitted.
Unless it was coincidence the ID at the end... |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:13 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
trial and error + educated guessing |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 02:49 PM |