Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: USER:HASH
Post: RE: USER:HASH
|
undeath |
hashcat
|
8 |
6,548 |
02-04-2018, 10:34 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
What hash mode are you attacking? If it's a slow one the easiest way would be to have a rule double the word and append + prepend the known part. If you want to combine that with a mask attack you can... |
|
undeath |
hashcat
|
8 |
6,282 |
02-22-2018, 10:36 AM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
undeath |
hashcat
|
8 |
6,282 |
02-24-2018, 12:16 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
can you post your full command line? |
|
undeath |
hashcat
|
8 |
6,282 |
03-02-2018, 12:24 AM |
|
|
Thread: PBKDF2-SHA512 separator unmatched
Post: RE: PBKDF2-SHA512 separator unmatched
what hashcat version are you using? The example hash works for me so you must be doing something wrong. |
|
undeath |
hashcat
|
8 |
6,526 |
06-12-2018, 02:26 PM |
|
|
Thread: PBKDF2-SHA512 separator unmatched
Post: RE: PBKDF2-SHA512 separator unmatched
I tried with the latest stable release (4.1.0) |
|
undeath |
hashcat
|
8 |
6,526 |
06-13-2018, 10:19 AM |
|
|
Thread: PBKDF2-SHA512 separator unmatched
Post: RE: PBKDF2-SHA512 separator unmatched
I put the example hash into an empty text file and used that as hashfile input for hashcat.
then I ran the command
Code:
--
hashcat -m 7100 -a 3 hashfile hashcat
--
|
|
undeath |
hashcat
|
8 |
6,526 |
06-20-2018, 11:03 AM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
i don't know what Y is, but bcrypt has its native salt encoded in the hash string. If you have an additional salt that is non-standard and you have to do non-standard things. |
|
undeath |
hashcat
|
8 |
5,602 |
07-12-2018, 06:54 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
What command are you running to crack the example hash and what output do you receive? |
|
undeath |
hashcat
|
8 |
5,602 |
07-15-2018, 05:45 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
Don't install the sdk, only install the normal driver. |
|
undeath |
hashcat
|
8 |
5,602 |
07-16-2018, 03:53 PM |
|
|
Thread: Hashcat wont start cracking [noob]
Post: RE: Hashcat wont start cracking [noob]
Looks like something with your opencl drivers is horribly broken. |
|
undeath |
hashcat
|
8 |
7,991 |
07-19-2018, 03:12 PM |
|
|
Thread: can i know???
Post: RE: can i know???
|
undeath |
hashcat
|
8 |
6,372 |
08-18-2018, 09:24 AM |
|
|
Thread: can i know???
Post: RE: can i know???
Sorry, I misread that. Yes, for 2501 you use hccapx files. |
|
undeath |
hashcat
|
8 |
6,372 |
08-18-2018, 09:46 AM |
|
|
Thread: can i know???
Post: RE: can i know???
2501 doesn't use normal word lists. That's the difference over 2500… |
|
undeath |
hashcat
|
8 |
6,372 |
08-18-2018, 09:58 AM |
|
|
Thread: can i know???
Post: RE: can i know???
you need to pre-generate a PMK list using https://github.com/ZerBea/hcxkeys |
|
undeath |
hashcat
|
8 |
6,372 |
08-18-2018, 10:19 AM |
|
|
Thread: Input and Output user/email:pass
Post: RE: Input and Output user/email:pass
|
undeath |
hashcat
|
8 |
4,955 |
09-08-2018, 03:43 PM |
|
|
Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...
|
undeath |
hashcat
|
8 |
5,507 |
12-10-2018, 07:49 PM |
|
|
Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...
Mem5 Wrote: (12-10-2018, 09:02 PM)
--
scrypt is very very slow. Buy more graphic cards ;)
--
wrong answer for scrypt. Buy more CPUs :P |
|
undeath |
hashcat
|
8 |
5,507 |
12-10-2018, 10:00 PM |
|
|
Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...
try running on your cpu instead of gpu |
|
undeath |
hashcat
|
8 |
5,507 |
12-11-2018, 11:35 AM |
|
|
Thread: Is this WPA password cracked?
Post: RE: Is this WPA password cracked?
if no hash was cracked there will be no potfile |
|
undeath |
hashcat
|
8 |
4,181 |
01-06-2019, 12:15 PM |