Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys
what do you mean by "very low speed"? how do you measure it? |
|
undeath |
hashcat
|
3 |
3,323 |
03-16-2018, 11:02 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
isn't that just the same as hmac-sha1(key = $pass)?
edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt) |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:19 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
you should be able to crack this by using
dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160 |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:29 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 12:23 PM |
|
|
Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...
what walterlacka wrote. You are missing B in your custom charset. |
|
undeath |
hashcat
|
3 |
2,893 |
03-16-2018, 07:34 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
All your findings are correct. There is no "native" way to do such a mask attack. |
|
undeath |
hashcat
|
5 |
3,851 |
03-17-2018, 07:15 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix. |
|
undeath |
hashcat
|
5 |
3,851 |
03-18-2018, 10:38 AM |
|
|
Thread: fast way to crack
Post: RE: fast way to crack
https://hashcat.net/wiki/doku.php?id=mask_attack
But even with fast hardware a full brute-force is going to take ages on WPA. |
|
undeath |
hashcat
|
2 |
2,261 |
03-18-2018, 11:21 AM |
|
|
Thread: PMK???
Post: RE: PMK???
PMK is only useful if you need to attack the same SSID many times. Most people will never need this. |
|
undeath |
hashcat
|
2 |
2,309 |
03-18-2018, 11:23 AM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
1. that's not how custom charsets work
2. convert each letter in user to its ascii hex representation |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 02:27 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
A charset is, as the name implies, a set of chars. Defining a string as charset is not going to do what you want. |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 05:55 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
You can use the mask attack but you cannot specify the user in a custom charset. |
|
undeath |
hashcat
|
7 |
5,475 |
03-18-2018, 06:27 PM |
|
|
Thread: please help me
Post: RE: please help me
Your commands are both correct. The first one is just missing the _ |
|
undeath |
hashcat
|
3 |
2,722 |
03-19-2018, 10:53 AM |
|
|
Thread: 7Zip Hash, missing SALT? (Salt-value exception)
Post: RE: 7Zip Hash, missing SALT? (Salt-value exception...
philsmd Wrote: (03-19-2018, 06:34 PM)
--
If you use the straight word list attack mode (-a 0) you also need to specify a dictionary file.
--
That's beside the point if the hash isn't loaded at all ... |
|
undeath |
hashcat
|
14 |
10,239 |
03-19-2018, 06:39 PM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
Such an attack mode is not implemented. You'd need to emulate it using custom generated mask files. |
|
undeath |
hashcat
|
5 |
4,178 |
03-19-2018, 07:35 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
just run hashcat64.exe --restore with no additional arguments |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:39 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
are you running the command in the same folder as you were running the attack in? |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:46 PM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
No, using increment would only be possible if your variable part is at the end. |
|
undeath |
hashcat
|
5 |
4,178 |
03-20-2018, 04:59 PM |
|
|
Thread: Hashing is 1/6th the speed of benchmarking
Post: RE: Hashing is 1/6th the speed of benchmarking
wordlist is (almost) always slower than bf. Additionally 7zip may have been using slightly different settings. I'm not sure what kind of variables the algorithms allows. |
|
undeath |
hashcat
|
2 |
2,485 |
03-21-2018, 10:28 AM |
|
|
Thread: hash mode numbering logic
Post: RE: hash mode numbering logic
It's mostly devoid of logic. There are some notable exceptions like the veracrypt familiy. |
|
undeath |
hashcat
|
5 |
4,203 |
03-21-2018, 11:44 AM |