Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: I have a question about password include question mark
Post: RE: I have a question about password include quest...
use "??" to specify a ? in a mask attack |
|
undeath |
hashcat
|
4 |
3,413 |
08-02-2018, 04:24 PM |
|
|
Thread: hashcat OpenCL error
Post: RE: hashcat OpenCL error
1. use the latest version of hashcat
2. don't use mesa. use rocm if it supports your card or try the official fglrx driver |
|
undeath |
hashcat
|
4 |
5,679 |
08-11-2018, 04:25 PM |
|
|
Thread: Wrong Time Estimated with -w 4 parameter
Post: RE: Wrong Time Estimated with -w 4 parameter
There can be lots of reasons for this. Some other program may have used the GPU within those four hours, leading to a temporary speed drop. Or maybe thermal throttling kicked in, slowing the cards dow... |
|
undeath |
hashcat
|
4 |
2,732 |
09-04-2018, 04:20 PM |
|
|
Thread: segfault on --stdout
Post: RE: segfault on --stdout
gshumway Wrote: (09-30-2018, 08:35 PM)
--
So for -m 2500, 1234567 would get rejected, and so would every variation created by the rule, regardless of correct length. Do I have this right?
--
That's... |
|
undeath |
hashcat
|
4 |
3,011 |
10-01-2018, 12:20 AM |
|
|
Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes
What is "rfc2898DeriveBytes" supposed to be? RFC2898 (https://tools.ietf.org/html/rfc2898) specifies mulitple KDFs, one of them being the supported PBKDF2 algorithm.
But anyway, all the algorithms ... |
|
undeath |
hashcat
|
4 |
2,994 |
10-01-2018, 11:51 AM |
|
|
Thread: segfault on --stdout
Post: RE: segfault on --stdout
Your syntax is correct. The only thing I can imagine is some incompatibility with debian testing and the binary build of hashcat. You can try compiling hashcat yourself or see if stdout works correctl... |
|
undeath |
hashcat
|
4 |
3,011 |
10-01-2018, 11:56 AM |
|
|
Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes
check out https://hashcat.net/wiki/doku.php?id=example_hashes
modes 10900 11900 12000 12100 |
|
undeath |
hashcat
|
4 |
2,994 |
10-01-2018, 01:38 PM |
|
|
Thread: gpu usage problem
Post: RE: gpu usage problem
Your PCIe bandwidth simply cannot keep up with the amount of words being sent to the GPUs. Unless you are running into some hashcat limitations (eg because you're using a very small wordlist with lots... |
|
undeath |
hashcat
|
4 |
3,139 |
10-03-2018, 11:53 AM |
|
|
Thread: attack mode 1 and session restore?
Post: RE: attack mode 1 and session restore?
maybe you haven't reached a checkpoint yet? How far was the attack? |
|
undeath |
hashcat
|
4 |
2,634 |
10-05-2018, 10:02 PM |
|
|
Thread: attack mode 1 and session restore?
Post: RE: attack mode 1 and session restore?
I cannot reproduce this problem with the same hash mode on hashcat 4.2.1 and combinator attack.
Code:
--
$ hashcat64.bin -m2500 --session test /tmp/test.hccapx wordlists/1 wordlists/2 -a1
Session... |
|
undeath |
hashcat
|
4 |
2,634 |
10-07-2018, 12:57 PM |
|
|
Thread: help designing an optimal attack - veracrypt non-boot drive
Post: RE: help designing an optimal attack - veracrypt n...
Sounds like you want to do a table attack (https://hashcat.net/wiki/doku.php?id=table_lookup_attack). Although you need to generate and pipe in candidates using hashcat-legacy (https://hashcat.net/... |
|
undeath |
hashcat
|
4 |
2,805 |
10-20-2018, 10:31 AM |
|
|
Thread: help designing an optimal attack - veracrypt non-boot drive
Post: RE: help designing an optimal attack - veracrypt n...
before running deps.sh, try running
export CC="x86_64-w64-mingw32-gcc"
export CXX="x86_64-w64-mingw32-g++" |
|
undeath |
hashcat
|
4 |
2,805 |
10-22-2018, 11:56 PM |
|
|
Thread: Cpu not available
Post: RE: Cpu not available
do you have the intel opencl runtime installed? |
|
undeath |
Hardware
|
4 |
3,333 |
10-29-2018, 01:09 AM |
|
|
Thread: Cpu not available
Post: RE: Cpu not available
https://software.intel.com/en-us/articles/opencl-drivers
Intel® CPU Runtime for OpenCL |
|
undeath |
Hardware
|
4 |
3,333 |
10-29-2018, 09:37 PM |
|
|
Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed
why are you using --force?
You can use hashmode 99999, save your plaintext password to the "hash" file and run the attack against your actual plaintext. |
|
undeath |
hashcat
|
4 |
2,788 |
10-30-2018, 01:37 AM |
|
|
Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed
You can learn hashcat's functionality much better by just using the command line and built it yourself using the information on --help |
|
undeath |
hashcat
|
4 |
2,788 |
10-31-2018, 12:33 PM |
|
|
Thread: brain-server
Post: RE: brain-server
hashcat --brain-server
for more info see https://hashcat.net/forum/thread-7903.html |
|
undeath |
hashcat
|
4 |
4,680 |
11-02-2018, 12:52 AM |
|
|
Thread: recovering Idrac password
Post: RE: recovering Idrac password
what is your password? how did you generate the hash? |
|
undeath |
hashcat
|
4 |
2,694 |
11-04-2018, 12:35 PM |
|
|
Thread: recovering Idrac password
Post: RE: recovering Idrac password
If you had posted the plaintext as requested it had been easier to help you. You need to add --hex-salt |
|
undeath |
hashcat
|
4 |
2,694 |
11-04-2018, 12:57 PM |
|
|
Thread: Brain working slow!!!
Post: RE: Brain working slow!!!
you should read https://hashcat.net/forum/thread-7903.html |
|
undeath |
General Talk
|
4 |
3,284 |
11-11-2018, 02:04 AM |