Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: hashcat on raspberry pi 4
Post: RE: hashcat on raspberry pi 4
https://hashcat.net/forum/thread-2368.html?highlight=raspberry+pi |
|
undeath |
hashcat
|
3 |
1,258 |
04-01-2020, 01:45 AM |
|
|
Thread: Hashcat help with email combining to password.
Post: RE: Hashcat help with email combining to password.
if you have a list of email:hash you can use --show with --username combined:
Code:
--
hashcat -m 99999 --show --username user_hash.txt
user1:passwd1:passwd1
user2:passwd2:passwd2
user3:passwd3:pass... |
|
undeath |
hashcat
|
3 |
971 |
04-02-2020, 12:41 AM |
|
|
Thread: Pregen PMKs using hashcat
Post: RE: Pregen PMKs using hashcat
It's not possible using hashcat. You need to use hcxtools. |
|
undeath |
hashcat
|
3 |
808 |
04-04-2020, 02:36 AM |
|
|
Thread: What is the diffenrence?
Post: RE: What is the diffenrence?
Different kinds of optimisations apply. They both try the same candidates but do so in very different ways. |
|
undeath |
hashcat
|
1 |
534 |
04-05-2020, 01:44 AM |
|
|
Thread: dictionnary
Post: RE: dictionnary
"at the same time" doesn't really make sense. You could start multiple hashcat instances, one for each dictionary, but that's not generally recommended.
Also, don't use --force. ever. |
|
undeath |
hashcat
|
4 |
1,122 |
04-08-2020, 11:33 AM |
|
|
Thread: Ryzen 3900x not recognized.
Post: RE: Ryzen 3900x not recognized.
never use --force
You need to install the Intel OpenCL runtime for your CPU to work. |
|
undeath |
hashcat
|
5 |
1,349 |
04-11-2020, 12:04 PM |
|
|
Thread: Ryzen 3900x not recognized.
Post: RE: Ryzen 3900x not recognized.
Doesn't matter, it works for AMD CPUs, too. |
|
undeath |
hashcat
|
5 |
1,349 |
04-11-2020, 01:05 PM |
|
|
Thread: Ryzen 3900x not recognized.
Post: RE: Ryzen 3900x not recognized.
Looks like installing the Intel OpenCL runtime broke the ICD loader for you. Maybe you can fix that by reinstalling the loader only. |
|
undeath |
hashcat
|
5 |
1,349 |
04-11-2020, 04:09 PM |
|
|
Thread: Help to specify mask/charset/command
Post: RE: Help to specify mask/charset/command
No, it's because there are so many possibilities you will never see the attack complete in your lifetime no matter what hardware you have. |
|
undeath |
hashcat
|
3 |
872 |
04-12-2020, 06:47 PM |
|
|
Thread: algo 20710
Post: RE: algo 20710
as written on the example hashes page, it's only available in the beta https://hashcat.net/beta/ |
|
undeath |
hashcat
|
2 |
828 |
04-13-2020, 10:25 PM |
|
|
Thread: Output progress over time in hashcat
Post: RE: Output progress over time in hashcat
You can use --status and --status-timer to log hashcat's progress to stdout (and redirect to a file) and then analyse those logs. |
|
undeath |
hashcat
|
3 |
897 |
04-13-2020, 11:56 PM |
|
|
Thread: Very Slow Keepass hash-rate
Post: RE: Very Slow Keepass hash-rate
The "test database file" probably simply had a lower iteration count. |
|
undeath |
hashcat
|
4 |
2,007 |
04-14-2020, 12:48 AM |
|
|
Thread: Output progress over time in hashcat
Post: RE: Output progress over time in hashcat
you can simply redirecd hashcat's output using your shell features. usually that means appending "> file.log" to your command line. |
|
undeath |
hashcat
|
3 |
897 |
04-14-2020, 01:18 PM |
|
|
Thread: MD5 - Dictionary attack
Post: RE: MD5 - Dictionary attack
Use hash mode 20 and specify the timestamp as salt. Then create a rule file to append the user and specify it last on the hashcat command line
then you can run hashcat like this:
hashcat -m 20 a... |
|
undeath |
hashcat
|
1 |
673 |
04-14-2020, 02:36 PM |
|
|
Thread: Bruteforcing SHA1 with knowing the salt
Post: RE: Bruteforcing SHA1 with knowing the salt
see "hashcat --example -m 110" for the expected format or have a look at https://hashcat.net/wiki/doku.php?id=example_hashes |
|
undeath |
hashcat
|
5 |
1,291 |
04-15-2020, 05:46 PM |
|
|
Thread: Bruteforcing SHA1 with knowing the salt
Post: RE: Bruteforcing SHA1 with knowing the salt
Yes, that's correct. You should specify a mask when running -a3 btw. |
|
undeath |
hashcat
|
5 |
1,291 |
04-15-2020, 08:29 PM |
|
|
Thread: pattern mask
Post: RE: pattern mask
You need to create a mask for each possible position of the known part. |
|
undeath |
hashcat
|
4 |
998 |
04-17-2020, 11:40 PM |
|
|
Thread: Noob: DES-OFB key recovery w/known contents
Post: RE: Noob: DES-OFB key recovery w/known contents
|
undeath |
hashcat
|
2 |
804 |
04-20-2020, 12:50 AM |
|
|
Thread: --markov-disable taking more time
Post: RE: --markov-disable taking more time
The faster hashes are cracked early on, the fewer hashes hashcat has to search through later. This of course has an impact on overall speed. If you want a fair comparison use a single hash that will n... |
|
undeath |
hashcat
|
3 |
890 |
04-20-2020, 12:36 PM |
|
|
Thread: DES-ECB
Post: RE: DES-ECB
That's because DES operates on 7 bits only. Both keys are valid. |
|
undeath |
hashcat
|
7 |
1,523 |
04-22-2020, 12:10 AM |