Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author [asc] Forum Replies Views Posted
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

this worked ./hashcat64.bin -m4800 -a3 777f2a3f6a2e661947b520c6777e0b25:45c915d82d67257209048420a31292d3:00 password
undeath hashcat 21 17,277 02-10-2018, 11:30 AM
    Thread: Itunes
Post: RE: itunes bis

please post the full output
undeath hashcat 4 3,249 02-09-2018, 10:28 PM
    Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat

https://hashcat.net/wiki/doku.php?id=example_hashes
undeath hashcat 10 8,863 02-10-2018, 02:13 PM
    Thread: Rules rules rules!
Post: RE: Rules rules rules!

for a start, here is the article about rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack The rules you need to accomplish what you are looking for arethe insert rule (i) the prepend rule...
undeath hashcat 3 2,929 02-10-2018, 02:52 PM
    Thread: Rules rules rules!
Post: RE: Rules rules rules!

Well, that will mostly depend on the size of your wordlist. Assuming passwords of up to 10 characters (before rules), you have [positions of LAD]*[positions of BYE]*[possibilities for m@1d]*[positi...
undeath hashcat 3 2,929 02-10-2018, 07:10 PM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

hashcat runs on any device supporting opencl, which includes modern CPUs and GPUs. You just need to install the correct opencl runtime for the device. If you want others to help you with cracking y...
undeath hashcat 21 17,277 02-10-2018, 11:20 PM
    Thread: Mask attack help
Post: RE: Mask attack help

zap44 Wrote: (02-11-2018, 01:04 AM) -- Based on my limited knowledge, I know that the password is in the range of 60521739 -> 67646497 from the information above. -- Wrong. Based on the information...
undeath hashcat 5 6,232 02-11-2018, 01:09 AM
    Thread: --stdout combinator attack
Post: RE: --stdout combinator attack

alternatively you can use combinator from hashcat-utils
undeath hashcat 2 2,402 02-11-2018, 12:53 PM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

unless there is a different way to check if the seed has been successfully decrypted other than the keccak hashing mentioned by philsmd above it's impossible to retrieve the password using the first 8...
undeath hashcat 26 24,603 02-11-2018, 02:12 PM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

philsmd Wrote: (02-11-2018, 02:24 PM) -- I'm almost 100% sure, that such a technique where somebody can recover a very long random seed by just having 80-bytes of the encrypted seed is currently infe...
undeath hashcat 26 24,603 02-11-2018, 02:36 PM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help
undeath hashcat 21 17,277 02-12-2018, 12:48 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

yes, the challenge is required in order to crack the hash.
undeath hashcat 21 17,277 02-12-2018, 01:01 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

I don't know how the CHAP handshake works but I would expect you can still crack a hash with a wrong password. The challenge should still be transmitted. Unless it was coincidence the ID at the end...
undeath hashcat 21 17,277 02-12-2018, 01:13 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

trial and error + educated guessing
undeath hashcat 21 17,277 02-12-2018, 02:49 PM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

There is no easy and quick generic way to learn things like this. It's knowledge you amass over months and years by reading, observation and experience, combined with a fair amount of common sense. ...
undeath hashcat 21 17,277 02-13-2018, 01:36 PM
    Thread: Integer overflow error
Post: RE: Integer overflow error

Dividing the work doesn't really matter if the estimated time is beyond the assumed end of the universe.
undeath hashcat 5 3,907 02-14-2018, 12:46 PM
    Thread: can a WPA hash be cracked with other than "2500" hash mode?
Post: RE: can a WPA hash be cracked with other than "250...

basskleff Wrote: (02-15-2018, 04:01 PM) -- I had researched the format of the hccpa/hccpax hashcat file, and I found that I could identify within there, the 32bit (16 hex pairs) md5 hash of the passw...
undeath hashcat 2 3,349 02-15-2018, 04:35 PM
    Thread: DES ECB error
Post: RE: DES ECB error

The high amount of multithreading causes non-determinism regarding the order of candidates processed.
undeath hashcat 10 7,626 02-17-2018, 09:38 PM
    Thread: Rules help with inserting multiple characters
Post: RE: Rules help with inserting multiple characters

no, you need one insert rule per character.
undeath hashcat 1 1,946 02-21-2018, 10:09 AM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

What hash mode are you attacking? If it's a slow one the easiest way would be to have a rule double the word and append + prepend the known part. If you want to combine that with a mask attack you can...
undeath hashcat 8 6,282 02-22-2018, 10:36 AM