Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: What am I missing?
Post: RE: What am I missing?
The BOM is always optional and its presence depends on your text editor. Notepad++ has an option to explicitly enable/disable it. BOM is almost exclusively used for unicode. https://en.wikipedia.org/w... |
|
undeath |
hashcat
|
3 |
2,804 |
04-15-2018, 10:17 AM |
|
|
Thread: 7z password recovery
Post: RE: 7z password recovery
easy answer: you can't crack it with hashcat.
Your keyspace is way too large anyway. |
|
undeath |
hashcat
|
7 |
8,537 |
04-15-2018, 11:12 PM |
|
|
Thread: PBKDF2-HMAC-SHA1 format for WPA hex key
Post: RE: PBKDF2-HMAC-SHA1 format for WPA hex key
base64-encoding the hex data is wrong. You first need to decode the hex, then base64-encode the result.
Quote:
--
Aditionally based on this post I modified the salt (ESSID) with a ":" at the end. In... |
|
undeath |
hashcat
|
2 |
3,011 |
04-18-2018, 07:31 PM |
|
|
Thread: Hashcat can't find password
Post: RE: Hashcat can't find password
you need to use rar2john from jtr-jumbo to extract the KDF data from the rar archive: https://github.com/magnumripper/JohnTheRipper
looks like you're going to have to compile that yourself or find ... |
|
undeath |
hashcat
|
3 |
3,482 |
04-20-2018, 10:12 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
royce Wrote: (04-22-2018, 07:51 PM)
--
even if you could cut the time in half (which would be much better than the keyspace reduction you're trying to do), will take a very very long time to run.
--
... |
|
undeath |
hashcat
|
6 |
4,323 |
04-22-2018, 08:25 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
yes, performance is better with m20 if you have a static prefix.
hash format is usually
Code:
--
hexhash:salt
--
|
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:26 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
how did you create the hash? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 12:05 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 01:06 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4
Other than that the most time you can save by running clever attacks. |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 05:59 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
targeted wordlists, targeted rules, more narrow masks, … |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:24 PM |
|
|
Thread: Line-length exception
Post: RE: Line-length exception
hashcat cannot find your hash file. |
|
undeath |
hashcat
|
2 |
2,006 |
04-26-2018, 11:45 PM |
|
|
Thread: Can anyone help me
Post: RE: Can anyone help me
you haven't happened to follow the suggestions hashcat gave you, have you?
Quote:
--
You are STRONGLY encouraged to use the drivers listed in docs/readme.txt.
--
|
|
undeath |
hashcat
|
3 |
3,116 |
04-27-2018, 06:13 PM |
|
|
Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem
A fundamental feature of a cryptographic hash function is that this is not possible. So no. |
|
undeath |
hashcat
|
3 |
2,661 |
04-30-2018, 09:06 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
first you need to find out how exactly the hash is generated |
|
undeath |
hashcat
|
5 |
5,007 |
05-01-2018, 03:30 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
It could also be some custom scheme. There is an unlimited number of ways to do salted iterated hashing. |
|
undeath |
hashcat
|
5 |
5,007 |
05-01-2018, 03:50 PM |
|
|
Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working
sounds like a broken opencl runtime. Does the same happen without -t option? |
|
undeath |
hashcat
|
4 |
3,114 |
05-07-2018, 05:20 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
dict is too small. You might need to do this attack differently. |
|
undeath |
hashcat
|
5 |
3,426 |
05-07-2018, 07:23 PM |
|
|
Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working
Your nvidia opencl runtime, not your intel one. Try reinstalling the graphics driver. |
|
undeath |
hashcat
|
4 |
3,114 |
05-07-2018, 07:24 PM |
|
|
Thread: [Copying] for a long time
Post: RE: [Copying] for a long time
efficient attack, ugly edition:
combine salt with each dict word and run -a3 with the mask only
alternatively use --stdout and simply pipe in the -a6 candidates. You don't have proper status but it's... |
|
undeath |
hashcat
|
5 |
3,426 |
05-07-2018, 09:26 PM |
|
|
Thread: Hashcat 4.1.0 slow speed
Post: RE: Hashcat 4.1.0 slow speed
static mask prefix is bad for performance |
|
undeath |
hashcat
|
6 |
3,903 |
05-12-2018, 11:30 AM |