Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
current version is 4.1.0
https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z |
|
undeath |
hashcat
|
9 |
6,765 |
02-22-2018, 09:35 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
so, are you on version 4.1.0 yet? |
|
undeath |
hashcat
|
9 |
6,765 |
02-22-2018, 10:13 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
undeath |
hashcat
|
8 |
6,282 |
02-24-2018, 12:16 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
|
undeath |
hashcat
|
13 |
10,132 |
02-25-2018, 01:58 PM |
|
|
Thread: Need help buying a rig, and not GPU based
Post: RE: Need help buying a rig, and not GPU based
If money is not a problem find someone to implement your attack on GPU for you. |
|
undeath |
Hardware
|
3 |
3,309 |
02-25-2018, 02:01 PM |
|
|
Thread: How do I extract the hashes from a file encrypted with PBKDF2-HMAC-SHA-1?
Post: RE: How do I extract the hashes from a file encryp...
there is no generic solution, especially for encrypted files. |
|
undeath |
hashcat
|
4 |
4,495 |
02-26-2018, 12:00 AM |
|
|
Thread: How do I extract the hashes from a file encrypted with PBKDF2-HMAC-SHA-1?
Post: RE: How do I extract the hashes from a file encryp...
Checking the correct password usually involves (trying) decrypting (part of) the file. Which means you need to know the encryption algorithm and some part of the encrypted data. You are going to need ... |
|
undeath |
hashcat
|
4 |
4,495 |
02-26-2018, 12:11 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
the file linked above is a valid hcmask file and as such includes the custom character sets. For more info see https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
increment mode incre... |
|
undeath |
hashcat
|
13 |
9,515 |
02-26-2018, 05:43 PM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
I have no idea what your scripts are doing but they are doing it wrong. The hcmask file definitely does not allow leading zeros. |
|
undeath |
hashcat
|
13 |
9,515 |
02-27-2018, 12:01 PM |
|
|
Thread: Sorry but: TrueCrypt USB-Drive
Post: RE: Sorry but: TrueCrypt USB-Drive
Not sure why you tried skip=1993276928. According to the FAQ you need the first 512 bytes of /dev/sdc1.
Is your password 0123456789 or 123456789? Are you using a hidden volume? |
|
undeath |
hashcat
|
3 |
3,678 |
02-27-2018, 03:39 PM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
no, it doesn't. there are no instances of .?1 or .?2
and a "normal" IPv4 representation does not have leading zeros
I generated that hcmask file :P |
|
undeath |
hashcat
|
13 |
9,515 |
02-27-2018, 06:29 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
is anything unclear about this warning?
Code:
--
* Device #2: Skipping unstable hash-mode 3200 for this device.
You can use --force to override, but do not report related errors.
--
|
|
undeath |
hashcat
|
5 |
5,603 |
02-27-2018, 06:36 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
ok, I'll translate the message for you:
Quote:
--
hash mode 3200 is known to be broken on this device. I'm refusing to run it. If you still want to run this hash mode on your broken device you can d... |
|
undeath |
hashcat
|
5 |
5,603 |
02-27-2018, 06:53 PM |
|
|
Thread: Sorry but: TrueCrypt USB-Drive
Post: RE: Sorry but: TrueCrypt USB-Drive
oh, I think I misread that for "first". Are you sure you are using the correct hash mode? I don't know what Truecrypt's default settings are. |
|
undeath |
hashcat
|
3 |
3,678 |
02-28-2018, 04:06 PM |
|
|
Thread: Problems with speed of brute-force by GPU
Post: RE: Problems with speed of brute-force by GPU
https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
7 |
10,830 |
03-01-2018, 07:55 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
can you post your full command line? |
|
undeath |
hashcat
|
8 |
6,282 |
03-02-2018, 12:24 AM |
|
|
Thread: Am i wasting my time?
Post: RE: Am i wasting my time?
You don't have to clean your cap and in fact it's not even recommended. Since it's your network and you know the passphrase you can simply put it into your wordlist for an easy and quick test. |
|
undeath |
hashcat
|
3 |
3,217 |
03-03-2018, 12:24 AM |
|
|
Thread: Help with mask
Post: RE: Help with mask
wordlist.txt
Code:
--
boats
--
numbers.rule
Code:
--
^0
^1
$0
$1
:
--
exclamation_mark.rule
Code:
--
$!
:
--
toggle0.rule
Code:
--
T0
:
--
toggle1.rule
Code:
--
T1
:
--
toggle2.rule
Code:
-... |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 02:20 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
Just a note, you can severely speed up the attack because your dictionary is very small here.
Code:
--
hashcat --stdout wordlist.txt -r toggle0.rule -r toggle1.rule -r toggle2.rule -r toggle3.rule -... |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 03:36 PM |
|
|
Thread: Help with mask
Post: RE: Help with mask
This particular attack only has 40000 candidates. Running the second command on your laptop will likely be faster than running the first command on your gaming rig. |
|
undeath |
hashcat
|
5 |
3,954 |
03-03-2018, 03:58 PM |