Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
this worked
./hashcat64.bin -m4800 -a3 777f2a3f6a2e661947b520c6777e0b25:45c915d82d67257209048420a31292d3:00 password |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:30 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
hashcat runs on any device supporting opencl, which includes modern CPUs and GPUs. You just need to install the correct opencl runtime for the device.
If you want others to help you with cracking y... |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:20 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 12:48 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
yes, the challenge is required in order to crack the hash. |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:01 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
I don't know how the CHAP handshake works but I would expect you can still crack a hash with a wrong password. The challenge should still be transmitted.
Unless it was coincidence the ID at the end... |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:13 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
trial and error + educated guessing |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 02:49 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
There is no easy and quick generic way to learn things like this. It's knowledge you amass over months and years by reading, observation and experience, combined with a fair amount of common sense.
... |
|
undeath |
hashcat
|
21 |
17,277 |
02-13-2018, 01:36 PM |
|
|
Thread: Building password list
Post: RE: Building password list
policygen from PACK https://github.com/iphelix/PACK |
|
undeath |
hashcat
|
21 |
7,827 |
09-01-2019, 11:22 AM |
|
|
Thread: Building password list
Post: RE: Building password list
you can use a simple hashcat mask attack for that |
|
undeath |
hashcat
|
21 |
7,827 |
09-02-2019, 12:22 PM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
i wonder if this happens when applying rules that shorten the words. Looks very much like the result of applying rule "*05 O03 d '3 p1" from best64.rule |
|
undeath |
hashcat
|
21 |
6,238 |
09-18-2019, 09:28 PM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
iirc password length restrictions are only enforced on the dictionary word, not the mutated candidate. |
|
undeath |
hashcat
|
21 |
6,238 |
09-18-2019, 11:27 PM |
|
|
Thread: hashcat 6.0.0
Post: RE: hashcat 6.0.0
Whooo, it's official finally! So many things happened since the last release! |
|
undeath |
hashcat
|
21 |
87,684 |
06-16-2020, 06:37 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
This is a great feature!
atom Wrote: (09-30-2020, 12:13 PM)
--
Instead you would create 3 wordlists, each containing one of the passwords at the same line number. That's much easier to maintain (e... |
|
undeath |
Beta Tester
|
21 |
3,762 |
09-30-2020, 12:18 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
ciccio17 Wrote: (10-01-2020, 06:43 PM)
--
…
--
This attack mode is specifically designed for large salted hash lists. It doesn't make sense with single hashes. |
|
undeath |
Beta Tester
|
21 |
3,762 |
10-01-2020, 08:16 PM |
|
|
Thread: watchdog do not work in 0.09 ?
Post: RE: watchdog do not work in 0.09 ?
according to this post:
https://hashcat.net/forum/thread-1191-post-6335.html#pid6335
your watchdog does generally not work. It might be a driver/hardware problem. |
|
undeath |
Very old oclHashcat-lite Support
|
22 |
35,197 |
05-20-2012, 06:24 PM |
|
|
Thread: watchdog do not work in 0.09 ?
Post: RE: watchdog do not work in 0.09 ?
your watchdog does generally not work, doesn't matter if you specify any watchdog-related option or not. |
|
undeath |
Very old oclHashcat-lite Support
|
22 |
35,197 |
05-22-2012, 12:46 AM |
|
|
Thread: Distributed Computing for cracking a long passwd
Post: RE: Distributed Computing for cracking a long pass...
oclhashcat-* won't crack anything with more than 15 chars. You probably did not specify --pw-min.
The part with the first four chars being fixed is a limitation of the cracking engine implementatio... |
|
undeath |
Very old oclHashcat-lite Support
|
22 |
46,751 |
07-09-2012, 09:44 PM |
|
|
Thread: Distributed Computing for cracking a long passwd
Post: RE: Distributed Computing for cracking a long pass...
undeath Wrote: (07-09-2012, 09:44 PM)
--
oclhashcat-* won't crack anything with more than 15 chars.
--
epixoip Wrote: (07-09-2012, 04:44 AM)
--
oclhashcat cannot crack passwords > 16 chars.
--
a... |
|
undeath |
Very old oclHashcat-lite Support
|
22 |
46,751 |
07-11-2012, 11:02 PM |
|
|
Thread: Distributed Computing for cracking a long passwd
Post: RE: Distributed Computing for cracking a long pass...
pretty useless to define -1 ?d though. |
|
undeath |
Very old oclHashcat-lite Support
|
22 |
46,751 |
07-13-2012, 03:42 PM |
|
|
Thread: Distributed Computing for cracking a long passwd
Post: RE: Distributed Computing for cracking a long pass...
|
undeath |
Very old oclHashcat-lite Support
|
22 |
46,751 |
07-25-2012, 07:56 PM |