Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
ok, so there are 4*36 possibilities per hash. That's perfectly doable, but you should write a small script instead of using hashcat for that. hashcat can't utilise its parallelisation well with that f... |
|
undeath |
hashcat
|
10 |
3,557 |
12-10-2019, 11:56 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
I can reproduce the error you are seeing, but only after the hash has been successfully cracked, hence hashcat exits early. |
|
undeath |
hashcat
|
10 |
3,557 |
12-16-2019, 01:00 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
this code is not extraordinarily fast but should give you an idea:
Code:
--
#!/usr/bin/env python3
from sys import argv
from itertools import product
if len(argv) != 2:
print("usage: {} place... |
|
undeath |
hashcat
|
10 |
3,557 |
12-11-2019, 05:28 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
From what I can see it the script should be able to handle that. Make sure the output word is among the printed candidates and if not we need to figure out why it isn't. |
|
undeath |
hashcat
|
10 |
3,557 |
12-28-2019, 11:01 PM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
If your password is truely 18 chars and you don't remember anything useful about it, give up. |
|
undeath |
General Talk
|
10 |
2,590 |
06-18-2020, 11:18 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-07-2020, 01:21 AM)
--
It would essentially be a brute force attack but with pre-generated passwords that one would use in a dict attack I guess.
--
I'm not sure what brou... |
|
undeath |
General Talk
|
10 |
2,064 |
07-07-2020, 10:02 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-06-2020, 12:00 PM)
--
Like taking already cracked passwords that were randomly generated and jumble them up or something like that?
--
That's what rule-based attacks do (... |
|
undeath |
General Talk
|
10 |
2,064 |
07-06-2020, 03:25 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file.
CracktainCrunch Wrote: (07-07-2020, 08:24 PM)
--
I u... |
|
undeath |
General Talk
|
10 |
2,064 |
07-08-2020, 08:29 PM |
|
|
Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?
@royce: I assume the bigger problem is with rules that are equivalent, yet do not have the same string representation, eg "sa4 sb6" and "sb6 sa4".
I guess you don't want to simply combine them but ... |
|
undeath |
hashcat
|
10 |
965 |
09-01-2020, 02:13 PM |
|
|
Thread: vBulletin MD5 without Salts
Post: RE: vBulletin MD5 without Salts
of course you could try to bruteforce a password AND a 30 character salts. It only slightly increases the work. 95^8 for the password and 95^30 for the salt. All in all 95^8+95^30. I don't think you w... |
|
undeath |
Old hashcat Support
|
9 |
28,779 |
11-04-2011, 03:34 PM |
|
|
Thread: Please help a beginner
Post: RE: Please help a beginner
The minimum amount of time is instant, although this case is very unlikely.
In general you can stick to these estimations:
https://golubev.com/gpuest.htm
So if you buy a rig consisting of 4x AMD... |
|
undeath |
General Help
|
9 |
15,075 |
03-08-2012, 01:23 AM |
|
|
Thread: Please help a beginner
Post: RE: Please help a beginner
Yes, this is correct. Theoretically it is possible that the unlock code is found after less than the estimated time but practically SL3 is know to mostly max out this estimation. It is a brute force p... |
|
undeath |
General Help
|
9 |
15,075 |
03-08-2012, 05:32 PM |
|
|
Thread: Please help a beginner
Post: RE: Please help a beginner
yes, the speed scales linear. Two cards of the same model double the speed (thus half the time). |
|
undeath |
General Help
|
9 |
15,075 |
03-08-2012, 09:27 PM |
|
|
Thread: vBulletin Salt Length
Post: RE: vBulletin Salt Length
The problem is that both require their own module/kernel because there are different optimizations. While for vb3 hashes two rounds of md5 are sufficient, vb4 hashes needs three rounds because of the ... |
|
undeath |
Feature Requests
|
9 |
22,262 |
03-18-2012, 03:06 PM |
|
|
Thread: hashcat-gui v0.5.1 - not work perfectly
Post: RE: hashcat-gui v0.5.1 - not work perfectly
specify custom charset 1: ?l?d?u and mask ?1?1?1?1?1?1?1?1
this will run a brutefoce with all passes of length 8. For longer passes you need to specify more ?1.
But this will take very much time... |
|
undeath |
Very old oclHashcat-plus Support
|
9 |
21,945 |
04-14-2012, 06:26 PM |
|
|
Thread: hashcat-gui v0.5.1 - not work perfectly
Post: RE: hashcat-gui v0.5.1 - not work perfectly
There are too many zeros ;)
2.400k = 2.400 * 1000 = 2.400 (the dot is not a thousand-separator)
As is said before, WPA takes very much time. You _cannot_ brute-force this in your lifetime. |
|
undeath |
Very old oclHashcat-plus Support
|
9 |
21,945 |
04-15-2012, 01:43 PM |
|
|
Thread: hashcat-gui v0.5.1 - not work perfectly
Post: RE: hashcat-gui v0.5.1 - not work perfectly
Brute forcing an upper/lower/digit pass of 10 chars will take too much time, no matter what type of hash.
If you however cannot limit the password to a mask, you need to run a wordlist attack and h... |
|
undeath |
Very old oclHashcat-plus Support
|
9 |
21,945 |
04-15-2012, 05:06 PM |
|
|
Thread: Issues with 7970 + Ubuntu
Post: RE: Issues with 7970 + Ubuntu
you have to wait for an update on plus. |
|
undeath |
Hardware
|
9 |
17,551 |
04-30-2012, 06:44 PM |
|
|
Thread: ./oclHashcat-plus64.bin returns "Segmentation fault"
Post: RE: ./oclHashcat-plus64.bin returns "Segmentation...
try removing the sdk and reinstall the driver. |
|
undeath |
Very old oclHashcat-plus Support
|
9 |
23,271 |
05-11-2012, 08:07 PM |
|
|
Thread: Help with md5($salt.$pass.$salt)
Post: RE: Help with md5($salt.$pass.$salt)
|
undeath |
Feature Requests
|
9 |
21,096 |
05-16-2012, 06:50 PM |