Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Integer overflow error
Post: RE: Integer overflow error
Dividing the work doesn't really matter if the estimated time is beyond the assumed end of the universe. |
|
undeath |
hashcat
|
5 |
3,907 |
02-14-2018, 12:46 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
is anything unclear about this warning?
Code:
--
* Device #2: Skipping unstable hash-mode 3200 for this device.
You can use --force to override, but do not report related errors.
--
|
|
undeath |
hashcat
|
5 |
5,603 |
02-27-2018, 06:36 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
ok, I'll translate the message for you:
Quote:
--
hash mode 3200 is known to be broken on this device. I'm refusing to run it. If you still want to run this hash mode on your broken device you can d... |
|
undeath |
hashcat
|
5 |
5,603 |
02-27-2018, 06:53 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
wordlist.txt
Code:
--
boats
--
numbers.rule
Code:
--
^0
^1
$0
$1
:
--
exclamation_mark.rule
Code:
--
$!
:
--
toggle0.rule
Code:
--
T0
:
--
toggle1.rule
Code:
--
T1
:
--
toggle2.rule
Code:
-... |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 02:20 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
Just a note, you can severely speed up the attack because your dictionary is very small here.
Code:
--
hashcat --stdout wordlist.txt -r toggle0.rule -r toggle1.rule -r toggle2.rule -r toggle3.rule -... |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 03:36 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
This particular attack only has 40000 candidates. Running the second command on your laptop will likely be faster than running the first command on your gaming rig. |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 03:58 PM |
|
|
Thread: Gtx 1050 Ti Experiences?
Post: RE: Gtx 1050 Ti Experiences?
If you only have one card and don't do 24/7 cracking a founders edition is not needed. I'm not even sure if the 1050(ti) is available as FE.
The bigger question is if it has a better price/speed ra... |
|
undeath |
Hardware
|
5 |
5,384 |
03-03-2018, 04:32 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
All your findings are correct. There is no "native" way to do such a mask attack. |
|
undeath |
hashcat
|
5 |
3,851 |
03-17-2018, 07:15 PM |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix. |
|
undeath |
hashcat
|
5 |
3,851 |
03-18-2018, 10:38 AM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
Such an attack mode is not implemented. You'd need to emulate it using custom generated mask files. |
|
undeath |
hashcat
|
5 |
4,178 |
03-19-2018, 07:35 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
just run hashcat64.exe --restore with no additional arguments |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:39 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
are you running the command in the same folder as you were running the attack in? |
|
undeath |
hashcat
|
5 |
4,143 |
03-20-2018, 01:46 PM |
|
|
Thread: 'Positional Anchor' type attacks?
Post: RE: 'Positional Anchor' type attacks?
No, using increment would only be possible if your variable part is at the end. |
|
undeath |
hashcat
|
5 |
4,178 |
03-20-2018, 04:59 PM |
|
|
Thread: hash mode numbering logic
Post: RE: hash mode numbering logic
It's mostly devoid of logic. There are some notable exceptions like the veracrypt familiy. |
|
undeath |
hashcat
|
5 |
4,203 |
03-21-2018, 11:44 AM |
|
|
Thread: how can I set the mask to a md5 hash result of itself?
Post: RE: how can I set the mask to a md5 hash result of...
hex encoded or binary? not that it really matters because the search space is too large anyway. |
|
undeath |
hashcat
|
5 |
3,576 |
03-31-2018, 10:58 PM |
|
|
Thread: how can I set the mask to a md5 hash result of itself?
Post: RE: how can I set the mask to a md5 hash result of...
Basically your salt is the "password" you are looking for. There should be a corresponding hash mode. |
|
undeath |
hashcat
|
5 |
3,576 |
04-01-2018, 12:25 AM |
|
|
Thread: Having hashcat check certain websites for known hashes
Post: RE: Having hashcat check certain websites for know...
It's a nice idea for an external tool but definitely should not end up in hashcat. |
|
undeath |
General Talk
|
5 |
4,580 |
04-01-2018, 10:31 AM |
|
|
Thread: Having hashcat check certain websites for known hashes
Post: RE: Having hashcat check certain websites for know...
hashcat is a specialised utility for cracking hashes quickly and efficiently. Querying third-party websites is totally out of scope and would require lots of additional maintenance, too. |
|
undeath |
General Talk
|
5 |
4,580 |
04-02-2018, 10:18 AM |
|
|
Thread: Advanced combination attack rule
Post: RE: Why do not many combination rules have such a ...
put all words in one dict and use combinator3 from hashcat-utils (https://hashcat.net/wiki/doku.php?id=hashcat_utils#combinator3) |
|
undeath |
hashcat
|
5 |
3,731 |
04-06-2018, 09:30 AM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
hashcat doesn't support that but I think maskprocessor has an option. |
|
undeath |
User Contributions
|
5 |
5,221 |
04-16-2018, 02:27 PM |