Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Crack my BlockChain.info wallet 1 password
Post: RE: Crack my BlockChain.info wallet 1 password
simply delete the characters from the end |
|
undeath |
hashcat
|
12 |
10,833 |
05-13-2018, 02:25 PM |
|
|
Thread: hi guys please a little help with hashcat
Post: RE: hi guys please a little help with hashcat
Quote:
--
* Device #1: ATTENTION! OpenCL kernel self-test failed.
--
hashcat shouldn't even start without using --force (which you are not using). Your opencl runtime is broken. Hashcat won't work pr... |
|
undeath |
hashcat
|
12 |
8,236 |
06-28-2018, 06:37 PM |
|
|
Thread: hi guys please a little help with hashcat
Post: RE: hi guys please a little help with hashcat
1. you don't need to use --force since hashcat already runs for whatever reason
2. --force won't make your problem go away, it will just cause hashcat to run anyway (not needed because 1.)
3. your G... |
|
undeath |
hashcat
|
12 |
8,236 |
06-28-2018, 06:48 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
at any time you can simply quit hashcat when running the command philsmd gave you and later resume the cracking by running "hashcat --restore" |
|
undeath |
General Talk
|
12 |
8,565 |
07-25-2018, 07:37 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
you need to specify the correct hash mode |
|
undeath |
General Talk
|
12 |
8,565 |
07-25-2018, 07:40 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
you can add -w4 but it will make your PC useless for anything that is not hashcat. |
|
undeath |
General Talk
|
12 |
8,565 |
07-25-2018, 10:01 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
|
undeath |
General Talk
|
12 |
8,565 |
07-25-2018, 11:00 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
Sorry, I misunderstood your question. No, you cannot simply add -w (or any other options) when using --restore. |
|
undeath |
General Talk
|
12 |
8,565 |
07-26-2018, 12:36 AM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
your are doing something weird. Why are you using -a6 with a 7 char mask when you're trying to crack a LM hash? The plaintext cannot be longer than 7 chars. -a6 is only fast if your left side has enou... |
|
undeath |
hashcat
|
12 |
6,451 |
10-26-2018, 03:35 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
see my edit above, piping (as you were already doing) is the correct approach. |
|
undeath |
hashcat
|
12 |
6,451 |
10-26-2018, 03:58 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
it should have used all the possibilities. You can check that by examining the output of the first command on its own. |
|
undeath |
hashcat
|
12 |
6,451 |
10-27-2018, 10:44 AM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
hashcat doesn't magically find the file for you on your system. Give the full path if it's not in your cwd.
What does this have to do with /etc/shadow at all? |
|
undeath |
hashcat
|
12 |
7,528 |
10-30-2018, 09:18 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Don't use --force and report resulting problems on here. Fix your problems. |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 12:34 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Well, remove --force and see what problems hashcat reports and fix them?! |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 10:20 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
https://hashcat.net/forum/thread-7686.html?highlight=stdin |
|
undeath |
hashcat
|
12 |
18,677 |
11-21-2018, 11:43 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
brute-forcing bcrypt is not feasible. |
|
undeath |
hashcat
|
12 |
18,677 |
11-22-2018, 05:36 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible. |
|
undeath |
hashcat
|
12 |
18,677 |
11-22-2018, 06:14 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Mem5 Wrote: (11-23-2018, 12:14 AM)
--
Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds.
--
With cost factor 12? I think you're being a little too optimistic :D |
|
undeath |
hashcat
|
12 |
18,677 |
11-23-2018, 04:50 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel. |
|
undeath |
hashcat
|
12 |
18,677 |
11-28-2018, 02:41 PM |
|
|
Thread: Not finding my own set password
Post: RE: Not finding my own set password
cannot reproduce with my hardware
Code:
--
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: AMD Ryzen 5 1600 Six-Core Processor.
OpenCL Platform ... |
|
undeath |
hashcat
|
12 |
6,010 |
12-15-2018, 11:04 PM |