Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
can you post your full command line? |
|
undeath |
hashcat
|
8 |
6,282 |
03-02-2018, 12:24 AM |
|
|
Thread: Am i wasting my time?
Post: RE: Am i wasting my time?
You don't have to clean your cap and in fact it's not even recommended. Since it's your network and you know the passphrase you can simply put it into your wordlist for an easy and quick test. |
|
undeath |
hashcat
|
3 |
3,217 |
03-03-2018, 12:24 AM |
|
|
Thread: Help with mask
Post: RE: Help with mask
wordlist.txt
Code:
--
boats
--
numbers.rule
Code:
--
^0
^1
$0
$1
:
--
exclamation_mark.rule
Code:
--
$!
:
--
toggle0.rule
Code:
--
T0
:
--
toggle1.rule
Code:
--
T1
:
--
toggle2.rule
Code:
-... |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 02:20 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
Just a note, you can severely speed up the attack because your dictionary is very small here.
Code:
--
hashcat --stdout wordlist.txt -r toggle0.rule -r toggle1.rule -r toggle2.rule -r toggle3.rule -... |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 03:36 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
This particular attack only has 40000 candidates. Running the second command on your laptop will likely be faster than running the first command on your gaming rig. |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 03:58 PM |
|
|
Thread: New hashcat freezes or very slow
Post: RE: New hashcat freezes or very slow
|
undeath |
hashcat
|
2 |
2,293 |
03-04-2018, 01:08 PM |
|
|
Thread: Hashcat does not seen password in the dictionarry
Post: RE: Hashcat does not seen password in the dictiona...
run with --potfile-disable otherwise hashcat will skip already cracked hashes.
Quote:
--
INFO: Removed 5 hashes found in potfile.
--
|
|
undeath |
hashcat
|
2 |
2,694 |
03-04-2018, 02:16 PM |
|
|
Thread: Trying to install hashcat on Windows 7 with AMD help
Post: RE: Trying to install hashcat on Windows 7 with AM...
5770 is too old and not supported by AMD any more (and thus hashcat). try with -D1 for CPU only |
|
undeath |
hashcat
|
3 |
4,638 |
03-10-2018, 10:08 PM |
|
|
Thread: Fan speed problem with hashcat
Post: RE: Fan speed problem with hashcat
Are you using the latest version? |
|
undeath |
hashcat
|
3 |
2,884 |
03-15-2018, 10:45 AM |
|
|
Thread: GPU runing two of six why?
Post: RE: GPU runing two of six why?
you are using -D1 which means only CPU. |
|
undeath |
hashcat
|
4 |
4,143 |
03-15-2018, 10:45 PM |
|
|
Thread: GPU runing two of six why?
Post: RE: GPU runing two of six why?
scrypt is designed to be extremely slow on GPU so that result is expected. |
|
undeath |
hashcat
|
4 |
4,143 |
03-16-2018, 10:56 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
What do you mean by "unknown text"? What is the technical difference to a password? |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 10:59 AM |
|
|
Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys
what do you mean by "very low speed"? how do you measure it? |
|
undeath |
hashcat
|
3 |
3,323 |
03-16-2018, 11:02 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
isn't that just the same as hmac-sha1(key = $pass)?
edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt) |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:19 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
you should be able to crack this by using
dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160 |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:29 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 12:23 PM |
|
|
Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...
what walterlacka wrote. You are missing B in your custom charset. |
|
undeath |
hashcat
|
3 |
2,893 |
03-16-2018, 07:34 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
All your findings are correct. There is no "native" way to do such a mask attack. |
|
undeath |
hashcat
|
5 |
3,851 |
03-17-2018, 07:15 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix. |
|
undeath |
hashcat
|
5 |
3,851 |
03-18-2018, 10:38 AM |
|
|
Thread: fast way to crack
Post: RE: fast way to crack
https://hashcat.net/wiki/doku.php?id=mask_attack
But even with fast hardware a full brute-force is going to take ages on WPA. |
|
undeath |
hashcat
|
2 |
2,261 |
03-18-2018, 11:21 AM |