Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
You have to reformat the hashes for cracking with hascat. Hashcat's format is SCRYPT:n:r:p:salt:hash
salt and hash are base64-encoded. I think hashcat only supports hash lengths of 32 bytes. You have... |
|
undeath |
hashcat
|
2 |
1,189 |
08-12-2019, 11:19 AM |
|
|
Thread: odd pdf hash
Post: RE: odd pdf hash
I don't know if there are slight differences in john's and hashcat's format but you can try with this script: https://github.com/stricture/hashstack-server-plugin-hashcat/blob/master/scrapers/pdf2hash... |
|
undeath |
hashcat
|
1 |
1,007 |
08-12-2019, 11:26 AM |
|
|
Thread: how to crack a windows 10 local user password hash(Netnlm capture)
Post: RE: how to crack a windows 10 local user password ...
-i does not accept any arguments, check --help for the correct usage |
|
undeath |
hashcat
|
14 |
4,712 |
08-12-2019, 03:27 PM |
|
|
Thread: phpBB uses bcrypt
Post: RE: phpBB uses bcrypt
What exact change would you propose? Changing the mode 400 description to "phpBB |
|
undeath |
hashcat
|
4 |
1,975 |
08-13-2019, 10:18 AM |
|
|
Thread: Can you resume if HC crashes?
Post: RE: Can you resume if HC crashes?
by default hashcat will create a session called "hashcat". You can restore the session by simply running "hashcat --restore". |
|
undeath |
hashcat
|
5 |
1,762 |
08-13-2019, 11:58 AM |
|
|
Thread: Can you resume if HC crashes?
Post: RE: Can you resume if HC crashes?
"8 digit upper alpha" would be
-1 ?d?u ?1?1?1?1?1?1?1?1
I guess you mean "8 characters upper alpha"? |
|
undeath |
hashcat
|
5 |
1,762 |
08-13-2019, 03:31 PM |
|
|
Thread: I want to get the maximum of -S --skip before running hashcat
Post: RE: I want to get the maximum of -S --skip before ...
use the --keyspace argument |
|
undeath |
hashcat
|
4 |
1,388 |
08-14-2019, 11:55 AM |
|
|
Thread: I want to get the maximum of -S --skip before running hashcat
Post: RE: I want to get the maximum of -S --skip before ...
you need to omit the hash when using --keyspace
btw, if you're trying to set up distributed cracking you might be interested in https://github.com/s3inlc/hashtopolis |
|
undeath |
hashcat
|
4 |
1,388 |
08-14-2019, 12:05 PM |
|
|
Thread: How to encrypt password with wpa2?
Post: RE: How to encrypt password with wpa2?
Ar76 Wrote: (08-14-2019, 06:33 PM)
--
atom Wrote: (08-14-2019, 11:00 AM)
--
But please, stop using the word encrypt, it hurts.
--
So what's the correct terminology?
--
to hash |
|
undeath |
hashcat
|
9 |
3,132 |
08-15-2019, 07:23 PM |
|
|
Thread: hybrid attack can't use all gpu power?
Post: RE: hybrid attack can't use all gpu power?
you can pipe in from another instance like this:
Code:
--
hashcat -a 6 wordlist.txt -1 dig_symbols.charset ?1?1?1?1?1?1 --increment --stdout | hashcat -m 11300 hash.txt
--
note that you won't be... |
|
undeath |
hashcat
|
5 |
1,885 |
08-15-2019, 11:03 PM |
|
|
Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies
not supported. you need to preprocess the hash file. |
|
undeath |
hashcat
|
6 |
1,858 |
08-16-2019, 12:08 AM |
|
|
Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies
hard to say, depends on the hash type and your vram and possibly the attack you're running. |
|
undeath |
hashcat
|
6 |
1,858 |
08-17-2019, 12:07 AM |
|
|
Thread: Hashcat temperature control only works when one GPU used at a time?
Post: RE: Hashcat temperature control only works when on...
fan control mechnisms have been removed from hashcat. |
|
undeath |
hashcat
|
3 |
1,408 |
08-18-2019, 05:22 PM |
|
|
Thread: Weird result with MSSQL 2000 mode 131
Post: RE: Weird result with MSSQL 2000 mode 131
A MSSQL 2000 hash consists of two hashes, one with the correct case and one with all upper case letters. Hashcat probably simply ignores one of them.
see https://www.theregister.co.uk/2002/07/08/crac... |
|
undeath |
hashcat
|
3 |
1,556 |
08-18-2019, 10:39 PM |
|
|
Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption
Don't use --force unless you are a developer.
You should run more clever attacks than brute-force. For example dictionary+rules. |
|
undeath |
hashcat
|
10 |
3,413 |
08-20-2019, 03:54 PM |
|
|
Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption
If you know it's just numbers and of no other details a mask attack is probably the best you can do. The "approaching final keyspace" notice is not of particular importance. |
|
undeath |
hashcat
|
10 |
3,413 |
08-21-2019, 08:07 PM |
|
|
Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption
What mask are you running? Are you using increment? iTunes uses very slow hashing, but I don't know how many iterations are usually used. Try adding -O -w3 |
|
undeath |
hashcat
|
10 |
3,413 |
08-21-2019, 09:43 PM |
|
|
Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption
With --increment and no lower limit you will see poor performance for short mask lengths. You can try -S in that case. |
|
undeath |
hashcat
|
10 |
3,413 |
08-21-2019, 10:53 PM |
|
|
Thread: Custom Hash Algorithm / Modify or Add new mode
Post: RE: Custom Hash Algorithm / Modify or Add new mode
No, those were manually re-hashed. |
|
undeath |
hashcat
|
3 |
2,091 |
08-22-2019, 04:13 PM |
|
|
Thread: Need help with building mask
Post: RE: Need help with building mask
You're not going to be happy trying to BF >= 8 characters full ascii charset. Try dict+rules if you haven't. |
|
undeath |
hashcat
|
6 |
2,304 |
08-22-2019, 04:19 PM |