Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Brute-force $HEX
Post: RE: Brute-force $HEX
Well, there is no easy way to do so (other than generating the candidates externally and piping them into hashcat which will slow down your attack). You can craft a mask that is using multiple bytes p... |
|
undeath |
hashcat
|
3 |
2,266 |
10-27-2018, 10:48 AM |
|
|
Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow
Your speed depends on the number of iterations. You can only achieve the same speed as the benchmark with a hash that has the same number of iterations (or less). |
|
undeath |
hashcat
|
3 |
2,011 |
10-29-2018, 11:10 AM |
|
|
Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat
Either you implement a kernel on your own for such a hash mode or you do the encoding externally and pipe in the already base64-encoded words in a0 mode, but this will cost quite some performance and ... |
|
undeath |
hashcat
|
3 |
2,375 |
10-30-2018, 09:42 AM |
|
|
Thread: How to crack custom hash - SHA512, SHA256, and MD5 combined
Post: RE: How to crack custom hash - SHA512, SHA256, and...
You'd have to write your own kernel for that. |
|
undeath |
hashcat
|
3 |
3,429 |
11-04-2018, 11:31 PM |
|
|
Thread: Salt input and bruteforcing
Post: RE: Salt input and bruteforcing
is the "number(1 to 9).1234567890876543" part fixed? If so you should add it to the salt. You don't need to define ?1 for a single character. You can simply use that character in the mask. |
|
undeath |
hashcat
|
3 |
2,136 |
11-09-2018, 12:17 PM |
|
|
Thread: Combinator help
Post: RE: Combinator help
why are you even trying to use -a 6? That's a completely different attack mode. Use -a 0 and pipe in princeprocessor. |
|
undeath |
hashcat
|
3 |
3,013 |
11-19-2018, 12:04 PM |
|
|
Thread: hashcat 5.0.0 with Token length exception with sha1
Post: RE: hashcat 5.0.0 with Token length exception with...
also note that you probably intended to run
Code:
--
echo "foo:$(echo -n bar | sha1sum | cut -d ' ' -f 1)"
--
|
|
undeath |
hashcat
|
3 |
8,195 |
11-19-2018, 07:36 PM |
|
|
Thread: Masking??? (Noob)
Post: RE: Masking??? (Noob)
thanks for the corrections, philsmd. Was a bit in a hurry when typing that. |
|
undeath |
hashcat
|
3 |
2,285 |
11-28-2018, 01:56 PM |
|
|
Thread: Masking??? (Noob)
Post: RE: Masking??? (Noob)
1. generate a list for the first part
hashcat --stdout -a3 -1 aA -2 bB -3 cC ?1?2?3 -o part1.txt
2. create a file part2.txt that has the three variations of the known parts
3. combine part1 + part2
... |
|
undeath |
hashcat
|
3 |
2,285 |
11-27-2018, 11:28 AM |
|
|
Thread: PDF password created through Mac OS Preview app
Post: RE: PDF password created through Mac OS Preview ap...
The append rule $ does only append and takes exactly one argument. $-! means "append - and then apply rule !". (! is a completely different rule and has one argument again). If you want to append "-!"... |
|
undeath |
hashcat
|
3 |
2,606 |
12-09-2018, 09:39 PM |
|
|
Thread: Freebsd 12/Ryzen 7 1700/ RX580
Post: RE: Freebsd 12/Ryzen 7 1700/ RX580
pocl and hashcat don't work together well. If possible try to install rocm. I'm not sure if rocm works on FreeBSD. |
|
undeath |
hashcat
|
3 |
2,661 |
12-17-2018, 02:01 PM |
|
|
Thread: FileVault 2 performance issue?
Post: RE: FileVault 2 performance issue?
That algorithm likely has a variable for iterations. You can only compare benchmarks for the same iteration count (eg by using hashcat's benchmark mode). |
|
undeath |
hashcat
|
3 |
2,035 |
12-20-2018, 11:25 AM |
|
|
Thread: Combinator attack - all posibillities
Post: RE: Combinator attack - all posibillities
merge all your lists and use princeprocessor (https://hashcat.net/wiki/doku.php?id=princeprocessor) |
|
undeath |
hashcat
|
3 |
2,000 |
01-01-2019, 07:36 PM |
|
|
Thread: OpenCL not throwing an error or showing OpenCL devices
Post: RE: OpenCL not throwing an error or showing OpenCL...
remove anything that has "cuda" or "sdk" in its name and make sure there are no leftovers. All you need is the intel opencl runtime and the standard nvidia driver. |
|
undeath |
hashcat
|
3 |
1,886 |
01-07-2019, 08:25 PM |
|
|
Thread: Help needed cracking a Mac password
Post: RE: Help needed cracking a Mac password
Don't create multiple threads for basically the same issue
https://hashcat.net/forum/thread-8057-post-43265.html |
|
undeath |
hashcat
|
3 |
4,028 |
01-07-2019, 08:29 PM |
|
|
Thread: newbie - how do I open/view the example hash .vc file?
Post: RE: newbie - how do I open/view the example hash ....
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_veracrypt_volumes |
|
undeath |
General Talk
|
3 |
2,710 |
02-16-2019, 04:54 PM |
|
|
Thread: Tesla s1070
Post: RE: Tesla s1070
|
undeath |
Hardware
|
3 |
2,573 |
03-11-2019, 12:35 AM |
|
|
Thread: Need help with one word + lots of rules.
Post: RE: Need help with one word + lots of rules.
If you suspect it's a mistyping of a single character I think your most promising attack would be a mask attack with a hcmask file like this:
Code:
--
?uretdada45!
H?letdada45!
Hr?ltdada45!
…... |
|
undeath |
hashcat
|
3 |
1,974 |
03-24-2019, 10:10 PM |
|
|
Thread: Is this a known and implemented algo?
Post: RE: Is this a known and implemented algo?
the hash is only 4 bytes, there are going to be loads of collisions, even on cpu only. https://github.com/LFriede/eset-password-recovery |
|
undeath |
hashcat
|
3 |
2,237 |
04-11-2019, 10:23 AM |
|
|
Thread: Integer overflow detected in keyspace of wordlist
Post: RE: Integer overflow detected in keyspace of wordl...
That error means your wordlist is too large. |
|
undeath |
hashcat
|
3 |
2,399 |
04-22-2019, 12:55 AM |