Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: new function
Post: RE: new function
if you add technical information (especially for 1 and 3) someone might bother adding this. Nobody is going to search for this if not provided. |
|
undeath |
User Contributions
|
8 |
13,999 |
05-17-2014, 11:24 PM |
|
|
Thread: new function
Post: RE: new function
sorry for being unspecific. With technical description I was referring to something like this: https://hashcat.net/forum/thread-2011.html |
|
undeath |
User Contributions
|
8 |
13,999 |
05-18-2014, 11:03 AM |
|
|
Thread: Hashtopus - distributed solution
Post: RE: Hashtopus - distributed solution
what license does this sw have? BSD? LGPL? Would be nice to see this on github. |
|
undeath |
User Contributions
|
289 |
592,182 |
06-01-2014, 09:14 PM |
|
|
Thread: Hashtopus - distributed solution
Post: RE: Hashtopus - distributed solution
magnum Wrote: (03-31-2015, 02:06 AM)
--
You should add this url to the OP too!
--
and/or on github |
|
undeath |
User Contributions
|
289 |
592,182 |
03-31-2015, 09:56 PM |
|
|
Thread: Rule new
Post: RE: Rule new
You don't want a rule, you want a mask matching a policy. Use PACK https://thesprawl.org/projects/pack/ |
|
undeath |
User Contributions
|
3 |
7,866 |
04-14-2015, 11:07 PM |
|
|
Thread: identify hash with duckgoduck
Post: RE: identify hash with duckgoduck
did not read the article but it's complete and utter bs. |
|
undeath |
User Contributions
|
2 |
7,835 |
06-05-2015, 08:55 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
devilsadvocate Wrote: (07-16-2017, 03:11 AM)
--
The python code for the 599 is functional, but it is very memory hungry.
--
You can probably fix that by replacing
Code:
--
return [y for y in cand... |
|
undeath |
User Contributions
|
182 |
305,386 |
07-16-2017, 05:52 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
What's the actual problem? Does hashcat not load the hash? |
|
undeath |
User Contributions
|
28 |
70,369 |
12-01-2017, 12:17 AM |
|
|
Thread: [ask] cap to hccapx
Post: RE: [ask] cap to hccapx
I only know of C implementations |
|
undeath |
User Contributions
|
6 |
6,453 |
12-06-2017, 06:27 PM |
|
|
Thread: [ask] cap to hccapx
Post: RE: [ask] cap to hccapx
If you already have one for hccap it should be easy to adopt to hccapx. |
|
undeath |
User Contributions
|
6 |
6,453 |
12-06-2017, 07:43 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
You might have realized this topic is almost 10 months old. It's long been implemented in the stable version of hashcat. I trust you to find the link yourself. |
|
undeath |
User Contributions
|
49 |
179,646 |
12-24-2017, 03:41 PM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
hashcat doesn't support that but I think maskprocessor has an option. |
|
undeath |
User Contributions
|
5 |
5,221 |
04-16-2018, 02:27 PM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
you can pipe the maskprocessor output to hashcat. no need to save anything to disk. |
|
undeath |
User Contributions
|
5 |
5,221 |
04-16-2018, 04:29 PM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
Code:
--
mp64 [options] | hashcat -a0 [options]
--
|
|
undeath |
User Contributions
|
5 |
5,221 |
04-17-2018, 11:44 AM |
|
|
Thread: What does mean -q and -r in mp
Post: RE: Hashcat pipe doesn't crack (WPA/2)
-q 4 -r 4 works but shouldn't -q 4 -r 3 work, too? |
|
undeath |
User Contributions
|
2 |
3,662 |
04-21-2018, 12:11 AM |
|
|
Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM
@ktinoulas: you are talking about an early-reject in the 5500 kernel. Looks like this is already implemented: https://github.com/hashcat/hashcat/blob/f6cfcbbc3a37e9b0ef9448f7d70f9013b65bd027/OpenCL/m0... |
|
undeath |
User Contributions
|
18 |
36,654 |
05-07-2018, 05:13 PM |
|
|
Thread: Hashcat piping doesn't work (WPA/2)
Post: RE: Hashcat piping doesn't work (WPA/2)
Are you able to crack the password using a different method than piping? mask attack, normal wordlist attack, … |
|
undeath |
User Contributions
|
4 |
6,411 |
05-11-2018, 11:28 AM |
|
|
Thread: Password Manager .rfp file analysis
Post: RE: Password Manager .rpf file analysis
philsmd Wrote: (06-06-2018, 06:47 AM)
--
RoboForm (a seemingly well-known and often recommended password manager).
--
I am doubtful. Never heard of it and obviously for good reasons.
However, than... |
|
undeath |
User Contributions
|
1 |
4,515 |
06-06-2018, 01:11 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
awdmesh Wrote: (08-06-2018, 01:43 PM)
--
Just curious - can you somehow run a word list against the PMKID?
--
hashcat usage for this hash mode is the same as for every other mode. |
|
undeath |
User Contributions
|
187 |
1,293,337 |
08-06-2018, 01:47 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
dominikg43g34 Wrote: (08-08-2018, 11:13 AM)
--
I'm using an Atheros chip, could this be the problem?
--
Atheros chips are in fact known to be buggy. See https://hashcat.net/forum/thread-6661-post-4... |
|
undeath |
User Contributions
|
187 |
1,293,337 |
08-08-2018, 11:46 AM |