Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Problem with restoring
Post: RE: Problem with restoring
use --session wpa --restore |
|
undeath |
hashcat
|
1 |
1,471 |
04-27-2019, 03:20 PM |
|
|
Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask
the answer hasn't changed since last year. https://hashcat.net/forum/thread-7749-post-41663.html#pid41663 |
|
undeath |
General Talk
|
7 |
6,482 |
04-28-2019, 06:01 PM |
|
|
Thread: cap2hccapx - Networks detected: 0
Post: RE: cap2hccapx - Networks detected: 0
the recommended tool for capturing handshakes is hcxdumptool |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
5,290 |
05-02-2019, 10:55 PM |
|
|
Thread: how is --hex-wordlist supposed to function?
Post: RE: how is --hex-wordlist supposed to function?
as the name of the option suggests, it expects all lines in the wordlist to be hex-encoded. What exactly did you expect the option to "take care of"? |
|
undeath |
hashcat
|
6 |
2,870 |
05-10-2019, 08:02 PM |
|
|
Thread: VeraCrypt with PIM/keyfile seems to be ignored
Post: RE: VeraCrypt with PIM/keyfile seems to be ignored
in the latest beta you need to use --veracrypt-pim-start=501 and --veracrypt-pim-stop=501 |
|
undeath |
hashcat
|
13 |
5,712 |
05-10-2019, 08:21 PM |
|
|
Thread: how is --hex-wordlist supposed to function?
Post: RE: how is --hex-wordlist supposed to function?
indeed that doesn't seem to work.
Code:
--
echo 'otoño' | hashcat -m 1000 bc4a371bba2211148ebcdee649c561fc
--
and
Code:
--
echo 'otoño' | hashcat -m 1000 bc4a371bba2211148ebcdee649c561fc --encodi... |
|
undeath |
hashcat
|
6 |
2,870 |
05-10-2019, 08:26 PM |
|
|
Thread: how is --hex-wordlist supposed to function?
Post: RE: how is --hex-wordlist supposed to function?
as the command line indicates, this is utf-16le.
Code:
--
echo 6f0074006f00f1006f00 | xxd -r -p | iconv --from=utf-16le
--
|
|
undeath |
hashcat
|
6 |
2,870 |
05-10-2019, 10:31 PM |
|
|
Thread: how to extract username:plain
Post: RE: how to extract username:plain
grep -v '^.*:[regex that matches hash]$' file |
|
undeath |
hashcat
|
1 |
1,290 |
05-12-2019, 10:54 PM |
|
|
Thread: Passwordlist constantly exhausted
Post: RE: Passwordlist constantly exhausted
why are you using --force? Please post the full hashcat output, the hash you are trying to crack and the corresponding plaintext. |
|
undeath |
hashcat
|
9 |
3,466 |
05-12-2019, 10:56 PM |
|
|
Thread: Passwordlist constantly exhausted
Post: RE: Passwordlist constantly exhausted
When you don't know the plaintext to your hash, how do you know it's included in your wordlist? |
|
undeath |
hashcat
|
9 |
3,466 |
05-13-2019, 02:47 PM |
|
|
Thread: Lost Open Docx password
Post: RE: Lost Open Docx password
use different wordlists, use rules, try to learn something about the password. |
|
undeath |
Hardware
|
6 |
3,366 |
05-13-2019, 02:50 PM |
|
|
Thread: Can someone explain what Payload pbkdf2 information means
Post: RE: Can someone explain what Payload pbkdf2 inform...
you can use this script to extract a string hashcat can handle from that file: https://github.com/stricture/hashstack-server-plugin-hashcat/blob/master/scrapers/blockchain2hashcat.py
note: change "ve... |
|
undeath |
hashcat
|
2 |
1,743 |
05-13-2019, 02:52 PM |
|
|
Thread: Lost Open Docx password
Post: RE: Lost Open Docx password
in the case you describe a mask attack would be much more appropriate than a wordlist attack. https://hashcat.net/wiki/doku.php?id=mask_attack
Do you remember if the later characters are upper or l... |
|
undeath |
Hardware
|
6 |
3,366 |
05-13-2019, 03:22 PM |
|
|
Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...
Can you show the information hashcat prints at the start of the cracking process? Where it lists the OpenCL devices. |
|
undeath |
hashcat
|
10 |
3,347 |
10-07-2019, 11:27 PM |
|
|
Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...
The part that lists all your detected devices |
|
undeath |
hashcat
|
10 |
3,347 |
10-07-2019, 11:35 PM |
|
|
Thread: Lost Open Docx password
Post: RE: Lost Open Docx password
then run a mask attack with -1 ?l?d PLO?1?1?1?1?1 |
|
undeath |
Hardware
|
6 |
3,366 |
05-14-2019, 08:24 PM |
|
|
Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...
I'm not sure what you're trying to do. The last command you show does of course produce 6 bytes, since utf-16 uses a fixed number of two bytes per character. Hence three characters require 6 bytes in ... |
|
undeath |
hashcat
|
8 |
2,730 |
06-13-2019, 03:12 PM |
|
|
Thread: Hashcat not working
Post: RE: Hashcat not working
"it's not working" is no acceptable problem description. If you have error messages post them. If you have no error messages explain what you are experiencing and what you would expect to happen.
I... |
|
undeath |
hashcat
|
4 |
2,031 |
05-23-2019, 09:07 PM |
|
|
Thread: Atoms client-less WPA-attack if PSK not in dict
Post: RE: Atoms client-less WPA-attack if PSK not in dic...
Please be more specific. What hash mode are you talking about?
In general, hashcat will never automatically switch between different attack modes. |
|
undeath |
hashcat
|
2 |
1,526 |
05-25-2019, 03:41 PM |
|
|
Thread: Decrypt DES-CBC RSA private key
Post: RE: Decrypt DES-CBC RSA private key
|
undeath |
hashcat
|
4 |
7,035 |
05-25-2019, 11:12 PM |