Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Brute-force $HEX
Post: RE: Brute-force $HEX
I'm not entirely sure but I think encoding-from/encoding-to does only work with wordlists. |
|
undeath |
hashcat
|
3 |
2,266 |
10-26-2018, 10:18 AM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
your are doing something weird. Why are you using -a6 with a 7 char mask when you're trying to crack a LM hash? The plaintext cannot be longer than 7 chars. -a6 is only fast if your left side has enou... |
|
undeath |
hashcat
|
12 |
6,451 |
10-26-2018, 03:35 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
see my edit above, piping (as you were already doing) is the correct approach. |
|
undeath |
hashcat
|
12 |
6,451 |
10-26-2018, 03:58 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
it should have used all the possibilities. You can check that by examining the output of the first command on its own. |
|
undeath |
hashcat
|
12 |
6,451 |
10-27-2018, 10:44 AM |
|
|
Thread: Brute-force $HEX
Post: RE: Brute-force $HEX
Well, there is no easy way to do so (other than generating the candidates externally and piping them into hashcat which will slow down your attack). You can craft a mask that is using multiple bytes p... |
|
undeath |
hashcat
|
3 |
2,266 |
10-27-2018, 10:48 AM |
|
|
Thread: Can't Get Past "hashcat (v4.2.1) starting..."
Post: RE: Can't Get Past "hashcat (v4.2.1) starting..."
Something is badly broken with your OpenCL drivers. You probably have a bad driver installed. This doesn't necessarily have to be your nvidia graphics driver. |
|
undeath |
hashcat
|
2 |
2,004 |
10-27-2018, 10:51 AM |
|
|
Thread: 3DES Is there a problem? where did I go wrong ?
Post: RE: 3DES Is there a problem? where did I go wrong ...
use a smaller charset than charsets/DES_full.charset
but anyway, if you want to crack a full 3DES key there are better attacks than a full bruteforce. Just hashcat is not your tool to do them. |
|
undeath |
hashcat
|
11 |
6,631 |
10-27-2018, 12:31 PM |
|
|
Thread: Hashcat see only 1 gpu - AMD RX470 rocm
Post: RE: Hashcat see only 1 gpu - AMD RX470 rocm
why are you using --force? Do you have fglrx installed? |
|
undeath |
hashcat
|
9 |
4,595 |
10-27-2018, 03:25 PM |
|
|
Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow
Your speed depends on the number of iterations. You can only achieve the same speed as the benchmark with a hash that has the same number of iterations (or less). |
|
undeath |
hashcat
|
3 |
2,011 |
10-29-2018, 11:10 AM |
|
|
Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed
why are you using --force?
You can use hashmode 99999, save your plaintext password to the "hash" file and run the attack against your actual plaintext. |
|
undeath |
hashcat
|
4 |
2,788 |
10-30-2018, 01:37 AM |
|
|
Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat
Either you implement a kernel on your own for such a hash mode or you do the encoding externally and pipe in the already base64-encoded words in a0 mode, but this will cost quite some performance and ... |
|
undeath |
hashcat
|
3 |
2,375 |
10-30-2018, 09:42 AM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
hashcat doesn't magically find the file for you on your system. Give the full path if it's not in your cwd.
What does this have to do with /etc/shadow at all? |
|
undeath |
hashcat
|
12 |
7,528 |
10-30-2018, 09:18 PM |
|
|
Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed
You can learn hashcat's functionality much better by just using the command line and built it yourself using the information on --help |
|
undeath |
hashcat
|
4 |
2,788 |
10-31-2018, 12:33 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Don't use --force and report resulting problems on here. Fix your problems. |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 12:34 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Well, remove --force and see what problems hashcat reports and fix them?! |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 10:20 PM |
|
|
Thread: brain-server
Post: RE: brain-server
hashcat --brain-server
for more info see https://hashcat.net/forum/thread-7903.html |
|
undeath |
hashcat
|
4 |
4,680 |
11-02-2018, 12:52 AM |
|
|
Thread: recovering Idrac password
Post: RE: recovering Idrac password
what is your password? how did you generate the hash? |
|
undeath |
hashcat
|
4 |
2,694 |
11-04-2018, 12:35 PM |
|
|
Thread: recovering Idrac password
Post: RE: recovering Idrac password
If you had posted the plaintext as requested it had been easier to help you. You need to add --hex-salt |
|
undeath |
hashcat
|
4 |
2,694 |
11-04-2018, 12:57 PM |
|
|
Thread: How to crack custom hash - SHA512, SHA256, and MD5 combined
Post: RE: How to crack custom hash - SHA512, SHA256, and...
You'd have to write your own kernel for that. |
|
undeath |
hashcat
|
3 |
3,429 |
11-04-2018, 11:31 PM |
|
|
Thread: hashcat v5.0.0
Post: RE: hashcat v5.0.0
see "Commandline Options" in the first post… |
|
undeath |
hashcat
|
11 |
50,025 |
11-05-2018, 02:56 PM |