Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Mask attack help
Post: RE: Mask attack help
zap44 Wrote: (02-11-2018, 01:04 AM)
--
Based on my limited knowledge, I know that the password is in the range of 60521739 -> 67646497 from the information above.
--
Wrong. Based on the information... |
|
undeath |
hashcat
|
5 |
6,232 |
02-11-2018, 01:09 AM |
|
|
Thread: --stdout combinator attack
Post: RE: --stdout combinator attack
alternatively you can use combinator from hashcat-utils |
|
undeath |
hashcat
|
2 |
2,402 |
02-11-2018, 12:53 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
unless there is a different way to check if the seed has been successfully decrypted other than the keccak hashing mentioned by philsmd above it's impossible to retrieve the password using the first 8... |
|
undeath |
hashcat
|
26 |
24,603 |
02-11-2018, 02:12 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
philsmd Wrote: (02-11-2018, 02:24 PM)
--
I'm almost 100% sure, that such a technique where somebody can recover a very long random seed by just having 80-bytes of the encrypted seed is currently infe... |
|
undeath |
hashcat
|
26 |
24,603 |
02-11-2018, 02:36 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 12:48 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
yes, the challenge is required in order to crack the hash. |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:01 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
I don't know how the CHAP handshake works but I would expect you can still crack a hash with a wrong password. The challenge should still be transmitted.
Unless it was coincidence the ID at the end... |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:13 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
trial and error + educated guessing |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 02:49 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
There is no easy and quick generic way to learn things like this. It's knowledge you amass over months and years by reading, observation and experience, combined with a fair amount of common sense.
... |
|
undeath |
hashcat
|
21 |
17,277 |
02-13-2018, 01:36 PM |
|
|
Thread: Integer overflow error
Post: RE: Integer overflow error
Dividing the work doesn't really matter if the estimated time is beyond the assumed end of the universe. |
|
undeath |
hashcat
|
5 |
3,907 |
02-14-2018, 12:46 PM |
|
|
Thread: can a WPA hash be cracked with other than "2500" hash mode?
Post: RE: can a WPA hash be cracked with other than "250...
basskleff Wrote: (02-15-2018, 04:01 PM)
--
I had researched the format of the hccpa/hccpax hashcat file, and I found that I could identify within there, the 32bit (16 hex pairs) md5 hash of the passw... |
|
undeath |
hashcat
|
2 |
3,349 |
02-15-2018, 04:35 PM |
|
|
Thread: DES ECB error
Post: RE: DES ECB error
The high amount of multithreading causes non-determinism regarding the order of candidates processed. |
|
undeath |
hashcat
|
10 |
7,626 |
02-17-2018, 09:38 PM |
|
|
Thread: Rules help with inserting multiple characters
Post: RE: Rules help with inserting multiple characters
no, you need one insert rule per character. |
|
undeath |
hashcat
|
1 |
1,946 |
02-21-2018, 10:09 AM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
What hash mode are you attacking? If it's a slow one the easiest way would be to have a rule double the word and append + prepend the known part. If you want to combine that with a mask attack you can... |
|
undeath |
hashcat
|
8 |
6,282 |
02-22-2018, 10:36 AM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
current version is 4.1.0
https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z |
|
undeath |
hashcat
|
9 |
6,765 |
02-22-2018, 09:35 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
so, are you on version 4.1.0 yet? |
|
undeath |
hashcat
|
9 |
6,765 |
02-22-2018, 10:13 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
undeath |
hashcat
|
8 |
6,282 |
02-24-2018, 12:16 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
|
undeath |
hashcat
|
13 |
10,132 |
02-25-2018, 01:58 PM |
|
|
Thread: How do I extract the hashes from a file encrypted with PBKDF2-HMAC-SHA-1?
Post: RE: How do I extract the hashes from a file encryp...
there is no generic solution, especially for encrypted files. |
|
undeath |
hashcat
|
4 |
4,495 |
02-26-2018, 12:00 AM |
|
|
Thread: How do I extract the hashes from a file encrypted with PBKDF2-HMAC-SHA-1?
Post: RE: How do I extract the hashes from a file encryp...
Checking the correct password usually involves (trying) decrypting (part of) the file. Which means you need to know the encryption algorithm and some part of the encrypted data. You are going to need ... |
|
undeath |
hashcat
|
4 |
4,495 |
02-26-2018, 12:11 AM |