Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Hybrid attack workload increase incase of small dic
Post: RE: Hybrid attack workload increase incase of smal...
Depending on what hash mode you are using (or how many salts) you can increase the performance using -S |
|
undeath |
hashcat
|
5 |
3,508 |
12-21-2018, 12:36 PM |
|
|
Thread: Combinator help
Post: RE: Combinator help
why are you even trying to use -a 6? That's a completely different attack mode. Use -a 0 and pipe in princeprocessor. |
|
undeath |
hashcat
|
3 |
3,013 |
11-19-2018, 12:04 PM |
|
|
Thread: hashcat 5.0.0 with Token length exception with sha1
Post: RE: hashcat 5.0.0 with Token length exception with...
also note that you probably intended to run
Code:
--
echo "foo:$(echo -n bar | sha1sum | cut -d ' ' -f 1)"
--
|
|
undeath |
hashcat
|
3 |
8,195 |
11-19-2018, 07:36 PM |
|
|
Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...
32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7).
All other security properties are trivially fulfilled under... |
|
undeath |
hashcat
|
2 |
2,089 |
11-20-2018, 01:48 AM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
https://hashcat.net/forum/thread-7686.html?highlight=stdin |
|
undeath |
hashcat
|
12 |
18,677 |
11-21-2018, 11:43 PM |
|
|
Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...
https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
7 |
4,636 |
11-22-2018, 11:53 AM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
brute-forcing bcrypt is not feasible. |
|
undeath |
hashcat
|
12 |
18,677 |
11-22-2018, 05:36 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible. |
|
undeath |
hashcat
|
12 |
18,677 |
11-22-2018, 06:14 PM |
|
|
Thread: Performance issues RTX 2070 in hashcat.
Post: RE: Performance issues RTX 2070 in hashcat.
-O was a major change. You'd have read about it in the release notes. |
|
undeath |
Hardware
|
4 |
7,944 |
11-22-2018, 10:27 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Mem5 Wrote: (11-23-2018, 12:14 AM)
--
Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds.
--
With cost factor 12? I think you're being a little too optimistic :D |
|
undeath |
hashcat
|
12 |
18,677 |
11-23-2018, 04:50 PM |
|
|
Thread: Need help with setup
Post: RE: Need help with setup
|
undeath |
General Talk
|
2 |
2,737 |
11-26-2018, 07:12 PM |
|
|
Thread: Won't start cracking (beginner)
Post: RE: Won't start cracking (beginner)
soxrok2212 Wrote: (11-26-2018, 03:32 PM)
--
You specify attack mode 3 (mask) but you don’t provide a mask so there is no work to be done.
--
hashcat uses a default mask (which is possibly not w... |
|
undeath |
Hardware
|
4 |
3,801 |
11-26-2018, 09:39 PM |
|
|
Thread: Masking??? (Noob)
Post: RE: Masking??? (Noob)
1. generate a list for the first part
hashcat --stdout -a3 -1 aA -2 bB -3 cC ?1?2?3 -o part1.txt
2. create a file part2.txt that has the three variations of the known parts
3. combine part1 + part2
... |
|
undeath |
hashcat
|
3 |
2,286 |
11-27-2018, 11:28 AM |
|
|
Thread: Masking??? (Noob)
Post: RE: Masking??? (Noob)
thanks for the corrections, philsmd. Was a bit in a hurry when typing that. |
|
undeath |
hashcat
|
3 |
2,286 |
11-28-2018, 01:56 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel. |
|
undeath |
hashcat
|
12 |
18,677 |
11-28-2018, 02:41 PM |
|
|
Thread: Incorrect results
Post: RE: Incorrect results
Please provide the exact command you ran and the files (wordlists) you used. What hardware are you using? What hashcat version are you using? Are you able to reproduce the problem with a different has... |
|
undeath |
hashcat
|
13 |
7,066 |
11-28-2018, 11:38 PM |
|
|
Thread: Incorrect results
Post: RE: Incorrect results
why are you using --force? Did you read the associated warning? |
|
undeath |
hashcat
|
13 |
7,066 |
11-29-2018, 01:22 AM |
|
|
Thread: Incorrect results
Post: RE: Incorrect results
don't run inside a vm and install the appropriate opencl runtime for your device. |
|
undeath |
hashcat
|
13 |
7,066 |
11-29-2018, 11:13 PM |
|
|
Thread: Incorrect results
Post: RE: Incorrect results
only if you have a vm that has pcie passthrough |
|
undeath |
hashcat
|
13 |
7,066 |
11-29-2018, 11:25 PM |
|
|
Thread: Extensible Build Review
Post: RE: Extensible Build Review
MrMeeseeks Wrote: (11-30-2018, 10:38 PM)
--
and they draw way too much power (enough to damage the motherboard.)
--
Has Nvidia pulled an AMD on the new cards? It's the first time I hear Nvidia card... |
|
undeath |
Hardware
|
6 |
4,890 |
12-01-2018, 01:25 PM |