Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: oclHashcat v2.10 performance questions?
Post: RE: oclHashcat v2.10 performance questions?
halexan Wrote: (05-03-2016, 05:49 AM)
--
Is there any method to narrow the gap?
--
atom Wrote: (04-27-2016, 10:43 AM)
--
Basically 1) add a rule (important!) and 2) add -w 3
--
note: preferably a ru... |
|
undeath |
Old oclHashcat Support
|
9 |
12,898 |
05-03-2016, 12:09 PM |
|
|
Thread: Double SHA1
Post: RE: Double SHA1
You could either code a custom hash mode for this or write a converter that generates all possible hashes from the concatenated numbers you have. |
|
undeath |
Old oclHashcat Support
|
9 |
13,637 |
06-20-2016, 05:40 PM |
|
|
Thread: Candidate definition
Post: RE: Candidate definition
lets call it "visual flavour". It doesn't really mean anything for markov mask attacks. |
|
undeath |
hashcat
|
9 |
13,199 |
06-22-2017, 10:43 AM |
|
|
Thread: hashcat v 4.0.0
Post: RE: hashcat v 4.0.0
https://hashcat.net/beta/ |
|
undeath |
hashcat
|
9 |
7,349 |
10-09-2017, 11:06 PM |
|
|
Thread: hashcat v 4.0.0
Post: RE: hashcat v 4.0.0
@Chick3nman: he's using -b and hence should be using optimized kernels already I think. My single 1060 pulls roughly 20 GH/s, so a 1070 + 1080 should be faster than 27 GH/s. Wouldn't that be about the... |
|
undeath |
hashcat
|
9 |
7,349 |
10-10-2017, 04:46 PM |
|
|
Thread: hashcat v 4.0.0
Post: RE: hashcat v 4.0.0
Looks like -w 3 in benchmark mode for some reason also implies not using optimized kernels (which can be turned on again by specifying -O). That's a little confusing. |
|
undeath |
hashcat
|
9 |
7,349 |
10-10-2017, 07:14 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
current version is 4.1.0
https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z |
|
undeath |
hashcat
|
9 |
6,765 |
02-22-2018, 09:35 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
so, are you on version 4.1.0 yet? |
|
undeath |
hashcat
|
9 |
6,765 |
02-22-2018, 10:13 PM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
What do you mean by "unknown text"? What is the technical difference to a password? |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 10:59 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
isn't that just the same as hmac-sha1(key = $pass)?
edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt) |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:19 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
you should be able to crack this by using
dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160 |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 11:29 AM |
|
|
Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text
btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG |
|
undeath |
hashcat
|
9 |
5,500 |
03-16-2018, 12:23 PM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
as you can see on https://hashcat.net/wiki/doku.php?id=example_hashes mode 10900 uses base64-encoded data, not hex |
|
undeath |
General Talk
|
9 |
7,198 |
05-13-2018, 05:17 PM |
|
|
Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_is_it_possible_that_hashcat_does_not_utilize_all_gpus |
|
undeath |
Hardware
|
9 |
6,985 |
05-17-2018, 03:35 PM |
|
|
Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat
I mean, you could simply read the information at the link I posted above OR you can keep posting further and wasting everyone's time. |
|
undeath |
Hardware
|
9 |
6,985 |
05-18-2018, 11:03 AM |
|
|
Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat
so, what did you do to provide more work? |
|
undeath |
Hardware
|
9 |
6,985 |
05-18-2018, 02:13 PM |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
You are mixing masks and rules here. That's not possible. |
|
undeath |
hashcat
|
9 |
5,668 |
06-25-2018, 07:03 PM |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
First, you need -r for every rule file you specify. However, the error you got seems like a opencl problem. is hashcat generally working? |
|
undeath |
hashcat
|
9 |
5,668 |
06-26-2018, 07:53 PM |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
mask attack/brute force should be your last resort, especially when you suspect the password is actually using a real word. Also that mask with --increment is going to try lots of invalid candidates. |
|
undeath |
hashcat
|
9 |
5,668 |
06-27-2018, 05:12 PM |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
regarding your opencl problem, I have no idea what exactly is wrong but I highly suspect something with your driver is kaput. |
|
undeath |
hashcat
|
9 |
5,668 |
06-27-2018, 05:54 PM |