Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: [HowTo] Depot oclHashcat-plus's hashcat.pot perfectly
Post: RE: [HowTo] Depot oclHashcat-plus's hashcat.pot pe...
because the salt might include colons as well. |
|
undeath |
General Talk
|
6 |
18,483 |
07-31-2012, 01:11 PM |
|
|
Thread: Restructuring pot file
Post: Restructuring pot file
Inspired from this (https://hashcat.net/forum/thread-1320-lastpost.html) thread i'd like to ask for a different format for the pot file to be created.
My suggestion is using the format salt$hash:pl... |
|
undeath |
Feature Requests
|
4 |
9,885 |
07-31-2012, 01:17 PM |
|
|
Thread: Restructuring pot file
Post: RE: Restructuring pot file
With the current pot file you cannot tell apart salt from plain if the salt contains a colon. If you prepend the salt to the hash you can easily make a regex to find the plain. ^.*\$[0-9a-f]{32,}:(?P.... |
|
undeath |
Feature Requests
|
4 |
9,885 |
07-31-2012, 04:03 PM |
|
|
Thread: Restructuring pot file
Post: RE: Restructuring pot file
yes, that would be a nicely working solution, too! |
|
undeath |
Feature Requests
|
4 |
9,885 |
07-31-2012, 04:40 PM |
|
|
Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me
you did not specify a mask. Also you have to quote your hash file. |
|
undeath |
Very old oclHashcat-plus Support
|
14 |
19,507 |
08-01-2012, 11:20 PM |
|
|
Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me
Code:
--
8--gpu-loops 256
--
you are missing a blank and you are still missing a mask |
|
undeath |
Very old oclHashcat-plus Support
|
14 |
19,507 |
08-02-2012, 11:18 PM |
|
|
Thread: SHA1 Customized Algorithm
Post: RE: SHA1 Customized Algorithm
save the hashes as
hash:USER:
(notice the trailing colon)
and use a rule to ensure every password is only tested in upper case.
then you can use sha1(salt.pass) |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
11,207 |
08-03-2012, 01:06 PM |
|
|
Thread: Seperator unmatched error
Post: RE: Seperator unmatched error
there is obviously no salt supplied. Also your "sha1" hash is 24bytes long, not 20 like it is supposed to be. |
|
undeath |
Old hashcat Support
|
1 |
6,301 |
08-05-2012, 05:46 PM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
you can try the OSC hash mode. |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,862 |
08-06-2012, 12:59 AM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
uhm, sorry. Seems like OSC is not supported by lite. Due to the way lite works you should not use a mask like 12345678?1?1?1?1 ... because lite relies on the first part of the plaintext not to be fixe... |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,862 |
08-06-2012, 01:26 AM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
OSC is md5(salt.pass), however it is not supported by lite. Read my other post. |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,862 |
08-06-2012, 01:58 AM |
|
|
Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me
|
undeath |
Very old oclHashcat-plus Support
|
14 |
19,507 |
08-06-2012, 06:18 PM |
|
|
Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?
if you only need to store user passwords, store a base64 encoded string of the hash. |
|
undeath |
General Talk
|
5 |
15,747 |
08-07-2012, 07:45 PM |
|
|
Thread: Error when cracking Domain Cashed Credentials - ms-cache
Post: RE: Error when cracking Domain Cashed Credentials ...
mscash is salted by the username. you need to supply hash:username |
|
undeath |
General Help
|
2 |
17,416 |
08-08-2012, 03:24 PM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4. |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:50 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e... |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:53 AM |
|
|
Thread: MD5(salt.pass)
Post: RE: MD5(salt.pass)
for GPU cracking you can try OSC, but it is probably limited to two character salts. |
|
undeath |
General Help
|
7 |
20,325 |
08-16-2012, 01:55 AM |
|
|
Thread: Two Question about bruteforce password vbb
Post: RE: Two Question about bruteforce password vbb
1. because you are an incompetent scripting kiddy.
2. the mask has to be at least the length to be bruteforced at maximum, say 10 times ?l for a 10 char password |
|
undeath |
Old hashcat Support
|
4 |
9,607 |
08-20-2012, 07:26 PM |
|
|
Thread: hashcat working on by far more passwords than wordlist
Post: RE: hashcat working on by far more passwords than ...
post the command line or a screenshot of the gui with all your options. |
|
undeath |
Very old oclHashcat-plus Support
|
4 |
9,238 |
09-08-2012, 11:08 AM |
|
|
Thread: double md5 not working
Post: RE: double md5 not working
damn, forgot to upgrade my drivers :/ Thank you. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
6,110 |
09-18-2012, 09:26 PM |