Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
laulaf Wrote: (07-31-2018, 05:46 PM)
--
Have you got some an exemple of software proper text editor ?
--
Notepad++ (https://notepad-plus-plus.org/) |
|
undeath |
hashcat
|
28 |
15,225 |
07-31-2018, 07:24 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
ANSI is alright, always use it for hash lists. UTF-8 only works when your text editor does not write a BOM (or has a way to disable it).
Your attack looks alright now. |
|
undeath |
hashcat
|
28 |
15,225 |
08-02-2018, 04:27 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
axcrypt is a highly iterated, thus slow, hash. Even for very fast hashes, brute-forcing more than 8 characters is hardly feasible. Brute-force is the last resort if you have no other options. |
|
undeath |
hashcat
|
28 |
15,225 |
08-03-2018, 11:38 AM |
|
|
Thread: backslash(\) slow down md5 speed
Post: RE: backslash(\) slow down md5 speed
Static prefixes in a mask attack slow down the attack, that's a known limitation in hashcat. Avoid static prefixes if possible and try to change your attack. |
|
undeath |
General Talk
|
2 |
2,315 |
11-11-2018, 02:21 AM |
|
|
Thread: Base password permutations
Post: RE: Base password permutations
generate rule files with rules for what you want to do |
|
undeath |
General Talk
|
2 |
2,148 |
09-17-2018, 11:23 PM |
|
|
Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw
It's a bunch of base64-encoded binary data but that's really all you can say. What makes you think it's hashes at all? |
|
undeath |
hashcat
|
6 |
5,009 |
05-21-2018, 08:39 PM |
|
|
Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw
Wouldn't some kind of encryption be much more likely, given that it seems to store some kind of extractable information? |
|
undeath |
hashcat
|
6 |
5,009 |
05-21-2018, 11:33 PM |
|
|
Thread: basic question hardware build
Post: RE: basic question hardware build
unless you need cpu cracking the cpu isn't important at all. 2gb of ram are also sufficient. All that matters is vram. You don't need a fast harddisk either. Even PCIe x1 would be enough per card. If ... |
|
undeath |
Hardware
|
2 |
5,765 |
01-27-2014, 04:37 PM |
|
|
Thread: Basic Questions - Hashs
Post: RE: Basic Questions - Hashs
You are very inpatient. Also this forum is about cracking hashes, not acquiring some. |
|
undeath |
General Help
|
5 |
9,892 |
10-18-2012, 09:52 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
i don't know what Y is, but bcrypt has its native salt encoded in the hash string. If you have an additional salt that is non-standard and you have to do non-standard things. |
|
undeath |
hashcat
|
8 |
5,600 |
07-12-2018, 06:54 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
What command are you running to crack the example hash and what output do you receive? |
|
undeath |
hashcat
|
8 |
5,600 |
07-15-2018, 05:45 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
Don't install the sdk, only install the normal driver. |
|
undeath |
hashcat
|
8 |
5,600 |
07-16-2018, 03:53 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
is anything unclear about this warning?
Code:
--
* Device #2: Skipping unstable hash-mode 3200 for this device.
You can use --force to override, but do not report related errors.
--
|
|
undeath |
hashcat
|
5 |
5,601 |
02-27-2018, 06:36 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
ok, I'll translate the message for you:
Quote:
--
hash mode 3200 is known to be broken on this device. I'm refusing to run it. If you still want to run this hash mode on your broken device you can d... |
|
undeath |
hashcat
|
5 |
5,601 |
02-27-2018, 06:53 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
https://hashcat.net/forum/thread-7686.html?highlight=stdin |
|
undeath |
hashcat
|
12 |
18,675 |
11-21-2018, 11:43 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
brute-forcing bcrypt is not feasible. |
|
undeath |
hashcat
|
12 |
18,675 |
11-22-2018, 05:36 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible. |
|
undeath |
hashcat
|
12 |
18,675 |
11-22-2018, 06:14 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Mem5 Wrote: (11-23-2018, 12:14 AM)
--
Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds.
--
With cost factor 12? I think you're being a little too optimistic :D |
|
undeath |
hashcat
|
12 |
18,675 |
11-23-2018, 04:50 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel. |
|
undeath |
hashcat
|
12 |
18,675 |
11-28-2018, 02:41 PM |
|
|
Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix
if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4 |
|
undeath |
General Talk
|
2 |
2,127 |
09-27-2018, 04:14 PM |