Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Hashcat not working on debian with r9 390 and AMDGPU drivers.
Post: RE: Hashcat not working on debian with r9 390 and ...
that probably means rocm isn't correctly installed |
|
undeath |
hashcat
|
6 |
2,720 |
06-25-2019, 04:35 PM |
|
|
Thread: Cannot load module ./modules/module_02000.dll
Post: RE: Cannot load module ./modules/module_02000.dll
The module should be in the OpenCL folder. Is it there? |
|
undeath |
hashcat
|
6 |
2,952 |
07-06-2019, 11:00 AM |
|
|
Thread: vast.ai gpu rentals?
Post: RE: vast.ai gpu rentals?
try with the beta version https://hashcat.net/beta/ |
|
undeath |
hashcat
|
6 |
2,847 |
07-20-2019, 11:01 AM |
|
|
Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies
not supported. you need to preprocess the hash file. |
|
undeath |
hashcat
|
6 |
1,858 |
08-16-2019, 12:08 AM |
|
|
Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies
hard to say, depends on the hash type and your vram and possibly the attack you're running. |
|
undeath |
hashcat
|
6 |
1,858 |
08-17-2019, 12:07 AM |
|
|
Thread: Need help with building mask
Post: RE: Need help with building mask
You're not going to be happy trying to BF >= 8 characters full ascii charset. Try dict+rules if you haven't. |
|
undeath |
hashcat
|
6 |
2,304 |
08-22-2019, 04:19 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
You can use princeprocessor for this. It can handle everything but the space between the words. Toggling the case of the first character can be done with a hashcat rule. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:36 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
Yes, you could simply append a space to every word in your wordlist for that case. Just remember to add a rule in hashcat that deletes the trailing space of the last word. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:43 PM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
this attack works:
Code:
--
hashcat -m10 $(python -c 'print("da8e187436ef310167021504d28c9b68"+":"+"00"*255)') -a3 '?b' --hex-salt
--
although hashcat's mask parser should probably be patched to all... |
|
undeath |
hashcat
|
6 |
2,043 |
10-09-2019, 06:06 PM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
There seems to be a bug with how hashcat processes hcmask files.
On the CLI this works:
Code:
--
hashcat -m0 da8e187436ef310167021504d28c9b68 -a3 "?b$(for x in $(seq 255) ; do echo -n 00; done)" --h... |
|
undeath |
hashcat
|
6 |
2,043 |
10-09-2019, 06:21 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind should be able to handle this |
|
undeath |
hashcat
|
6 |
2,051 |
10-31-2019, 12:08 PM |
|
|
Thread: hashcat crash on benchmark
Post: RE: hashcat crash on benchmark
Looks like some kind of hardware error. Are you using risers?
Possibly a heat problem, try running
hashcat -a3 00000000000000000000000000000000 ?a?a?a?a?a?a?a?a?a
for a few minutes and see wha... |
|
undeath |
hashcat
|
6 |
1,947 |
12-08-2019, 02:28 PM |
|
|
Thread: two-key triple DES
Post: RE: two-key triple DES
MrLampe Wrote: (12-10-2019, 07:53 PM)
--
Only it is 2 x 56 = 112 bits.
--
I don't know what kind of hardware you have available but with my GPU (GTX 1060) bruteforcing 112 bit on DES 14000 would ta... |
|
undeath |
hashcat
|
6 |
1,882 |
12-10-2019, 09:36 PM |
|
|
Thread: two-key triple DES
Post: RE: two-key triple DES
My answer should have made you realise that no matter what hardware you have, there is no way you are going to crack a 112bit DES key. |
|
undeath |
hashcat
|
6 |
1,882 |
12-12-2019, 09:16 PM |
|
|
Thread: two-key triple DES
Post: RE: two-key triple DES
Is it possible to attempt to crack this with hashcat? yes
Is it possible to test even a reasonably sized subset of the keyspace with hashcat? no |
|
undeath |
hashcat
|
6 |
1,882 |
12-23-2019, 12:09 AM |
|
|
Thread: password 8 letters
Post: RE: password 8 letters
if you want to shorten the testing process you can for example run
hashcat -m 2500 -a 3 -o password.txt dom.hccapx huberus
or
hashcat -m 2500 -a 3 -o password.txt dom.hccapx huberu?l |
|
undeath |
hashcat
|
6 |
1,841 |
01-19-2020, 11:57 PM |
|
|
Thread: Hashcat Performance
Post: RE: Hashcat Performance
Can you please paste the hashcat output and highlight the parts you have questions about? I'm having trouble following your descriptions. |
|
undeath |
hashcat
|
6 |
2,184 |
03-03-2020, 08:05 PM |
|
|
Thread: Hashcat Performance
Post: RE: Hashcat Performance
Code:
--
hashcat -h | grep workload
-w, --workload-profile | Num | Enable a specific workload profile, see pool below | -w 3
--
Quote:
--
OpenCL Platform #1: Intel(R) Corporation
===... |
|
undeath |
hashcat
|
6 |
2,184 |
03-03-2020, 08:43 PM |
|
|
Thread: Hashcat Performance
Post: RE: Hashcat Performance
You can also raise the workload when using a CPU. I have no idea what GPU you have so I cannot tell you what OpenCL runtime you need. But since you're using a laptop it may not matter much since onboa... |
|
undeath |
hashcat
|
6 |
2,184 |
03-03-2020, 11:19 PM |
|
|
Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.
What is your full command line? How do you determine hashcat only using one device? |
|
undeath |
hashcat
|
6 |
1,682 |
03-09-2020, 06:18 PM |