Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: 2x GTX 1080ti + 1070 on MD5 /NTLM very very slow
Post: RE: 2x GTX 1080ti + 1070 on MD5 /NTLM very very sl...
0) https://hashcat.net/wiki/doku.php?id=fingerprint_attack
1) That's because of the way hashcat works internally. The left side should have as much work as possible. Together with NTLM being one of t... |
|
undeath |
hashcat
|
11 |
7,371 |
09-29-2018, 05:15 PM |
|
|
Thread: 3DES Is there a problem? where did I go wrong ?
Post: RE: 3DES Is there a problem? where did I go wrong ...
use a smaller charset than charsets/DES_full.charset
but anyway, if you want to crack a full 3DES key there are better attacks than a full bruteforce. Just hashcat is not your tool to do them. |
|
undeath |
hashcat
|
11 |
6,631 |
10-27-2018, 12:31 PM |
|
|
Thread: hashcat v5.0.0
Post: RE: hashcat v5.0.0
see "Commandline Options" in the first post… |
|
undeath |
hashcat
|
11 |
50,025 |
11-05-2018, 02:56 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
hashcatlinux Wrote: (02-02-2019, 02:39 PM)
--
Code:
--
hashcat -m 3000 -a 3 -1 ?l?d?s?u -2 ?l?d?s?u ?1?1?1?1?1?1?1?1?1?1?1?1?1?1 Â hashes.txt
zsh: no matches found: ?l?d?s?u
--
--
Learn how your s... |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 02:58 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
windows uses two LM hashes to store such long passwords. |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 03:44 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
well, you have to start hashcat correctly. Your arguments are out of order. |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 05:19 PM |
|
|
Thread: increase maximum password length supported by kernel
Post: RE: increase maximum password length supported by ...
Unless you are some kind of divine being there is no use in such an attack. It will surpass the estimated end of our universe. |
|
undeath |
hashcat
|
11 |
5,132 |
02-02-2019, 06:41 PM |
|
|
Thread: Hi, need some help about hashcat
Post: RE: Hi, need some help about hashcat
Mem5 Wrote: (03-10-2019, 08:34 PM)
--
You need python to run pdf2john.py,
--
actually it's pdf2john.pl, hence a perl script which you need perl for, not python. |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
11 |
6,617 |
03-11-2019, 12:36 AM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
The LM hashes are only used by old versions of AD servers, which is why they are sometimes kept iirc. |
|
undeath |
General Talk
|
11 |
5,710 |
08-26-2019, 04:01 PM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
each NTLM hash should have two corresponding LM hashes, so you do not need to BF the second part of the password. |
|
undeath |
General Talk
|
11 |
5,710 |
08-27-2019, 10:14 AM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
exactly
It might be useful to convert the LM results to lower-case for that attack. You are likely to get hits a litte bit faster because passwords tend to mainly consist of lower case characters. |
|
undeath |
General Talk
|
11 |
5,710 |
08-27-2019, 04:23 PM |
|
|
Thread: Building a password rig with 0 success... help needed!
Post: RE: Building a password rig with 0 success... help...
The problems you are seeing sound like defective risers. |
|
undeath |
hashcat
|
11 |
3,970 |
10-03-2019, 11:47 AM |
|
|
Thread: Building a password rig with 0 success... help needed!
Post: RE: Building a password rig with 0 success... help...
Mrblank Wrote: (10-04-2019, 05:39 AM)
--
you need more system RAM then the combined vram of the gpus, those 1070s afaik are 8gb vram each, do you have sufficient RAM inserted?
--
This is true for h... |
|
undeath |
hashcat
|
11 |
3,970 |
10-04-2019, 02:48 PM |
|
|
Thread: Custom mask generator
Post: RE: Custom mask generator
policygen generates a mask file which is then used in hashcat's mask attack, hence subject to the markov generator. |
|
undeath |
hashcat
|
11 |
5,304 |
12-26-2019, 05:06 PM |
|
|
Thread: Custom mask generator
Post: RE: Custom mask generator
Ah, I understand. No, that's not possible with hashcat and I believe it's not as easy to implement as you expect.
One thing you could do is run each mask until 5% or 10% (you can probably use -s/-l... |
|
undeath |
hashcat
|
11 |
5,304 |
12-26-2019, 05:31 PM |
|
|
Thread: Custom mask generator
Post: RE: Custom mask generator
You can use hashcat's wordlist mode (a0) and pipe in words through stdin using whatever generator you like. However on fast hash modes that will cost a lot performance. |
|
undeath |
hashcat
|
11 |
5,304 |
12-26-2019, 07:00 PM |
|
|
Thread: Which Feature / Algo to add next to oclHashcat?
Post: RE: Which Feature / Algo to add next to oclHashcat...
I would also like to see a DES (unix) possibility!
all GPU crackers i saw until now did not use bitsliced DES what made john on a single i7 core about 50% faster than my 8800GTS..... (2mio vs 1,5mi... |
|
undeath |
Feature Requests
|
10 |
26,413 |
07-07-2010, 09:45 PM |
|
|
Thread: crack long password how to fix "no combinations possible"
Post: RE: crack long password how to fix "no combination...
hashcat can crack this. simply create a rule-file with this rule:
Code:
--
$S$E$C$U$R$I$T$Y$K$E$Y$W$O$R$D
--
|
|
undeath |
Feature Requests
|
10 |
29,861 |
08-12-2011, 09:18 PM |
|
|
Thread: crack long password how to fix "no combinations possible"
Post: RE: crack long password how to fix "no combination...
hashcat can crack this.
Code:
--
hashcat-cli64.exe -m102 hash.txt word.txt -r rule.txt -e salt.txt
Initializing hashcat v0.37 by atom with 8 threads and 32mb segment-size...
NOTE: press ente... |
|
undeath |
Feature Requests
|
10 |
29,861 |
08-12-2011, 11:10 PM |
|
|
Thread: sha512($salt.$pass)
Post: RE: sha512($salt.$pass)
|
undeath |
Feature Requests
|
10 |
30,353 |
02-27-2012, 10:17 PM |