Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
hashcat runs on any device supporting opencl, which includes modern CPUs and GPUs. You just need to install the correct opencl runtime for the device.
If you want others to help you with cracking y... |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:20 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 12:48 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
yes, the challenge is required in order to crack the hash. |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:01 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
I don't know how the CHAP handshake works but I would expect you can still crack a hash with a wrong password. The challenge should still be transmitted.
Unless it was coincidence the ID at the end... |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:13 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
trial and error + educated guessing |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 02:49 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
There is no easy and quick generic way to learn things like this. It's knowledge you amass over months and years by reading, observation and experience, combined with a fair amount of common sense.
... |
|
undeath |
hashcat
|
21 |
17,277 |
02-13-2018, 01:36 PM |
|
|
Thread: cracking a domain cachedump
Post: RE: cracking a domain cachedump
slawson Wrote: (11-08-2014, 04:44 AM)
--
If I have a hash from a Domain Credentials cache dump, can I crack it by using either hash type 1000 or 1100? My testing shows that cracking via type 1100 is... |
|
undeath |
Old oclHashcat Support
|
6 |
16,230 |
11-08-2014, 02:38 PM |
|
|
Thread: Cracking a SHA-256 hash
Post: RE: Cracking a SHA-256 hash
1. how to crack? A: https://hashcat.net/wiki/
2. is SHA-256 a safe PSA? A: No.
2.b What is better? A: (pbkdf2), bcrypt, scrypt, argon2 (weak -> strong)
3. Does that matter for a password with 36^64 po... |
|
undeath |
General Help
|
1 |
25,921 |
05-28-2016, 07:25 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
Pure masks don't support this but you can create a hcmask file with policygen from PACK: https://github.com/iphelix/PACK |
|
undeath |
hashcat
|
7 |
1,538 |
05-11-2020, 01:04 AM |
|
|
Thread: Cracking ethereum wallet password
Post: RE: Cracking ethereum wallet password
first, do not post hashes.
second, you are not specifying an attack mode and corresponding settings, hence hashcat defaults to stdin mode with a0. |
|
undeath |
hashcat
|
3 |
5,572 |
12-20-2017, 03:56 PM |
|
|
Thread: Cracking ethereum wallet password
Post: RE: Cracking ethereum wallet password
If you don't specify a mask hashcat will use a default one which is probably not what you want. Anyway, cracking such a wallet with bf is near impossible unless the password is very short (and you kno... |
|
undeath |
hashcat
|
3 |
5,572 |
12-20-2017, 04:36 PM |
|
|
Thread: Cracking failed on Radeon Pro WX5100
Post: RE: Cracking failed on Radeon Pro WX5100
please post the full hashcat output of a cracking attempt. |
|
undeath |
hashcat
|
5 |
6,864 |
05-09-2017, 02:30 PM |
|
|
Thread: cracking hashs how to ignore user name??
Post: RE: cracking hashs how to ignore user name??
you have to format it myusername:hash:salt and use the --username switch. |
|
undeath |
Old hashcat Support
|
4 |
9,905 |
04-22-2012, 02:13 PM |
|
|
Thread: cracking hashs how to ignore user name??
Post: RE: cracking hashs how to ignore user name??
you format it like
myusername:hash:salt
and start hashcat with the --username switch |
|
undeath |
Old hashcat Support
|
4 |
9,905 |
04-22-2012, 02:29 PM |
|
|
Thread: Cracking in Google Cloud Instance Questions.
Post: RE: Cracking in Google Cloud Instance Questions.
Code:
--
[email protected]:~/hashcat-4.2.1$ clinfo
Number of platforms 0
--
well, there's your problem. opencl runtime isn't installed or working. |
|
undeath |
Hardware
|
17 |
14,865 |
09-26-2018, 11:52 PM |
|
|
Thread: Cracking LM
Post: RE: Cracking LM
what driver do you have installed?
might be connected to this? https://hashcat.net/forum/thread-1173.html |
|
undeath |
Very old oclHashcat-plus Support
|
8 |
33,383 |
05-28-2012, 06:24 PM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
yep, your plain is wrong.
echo -n 'ьфдщн' | md5sum
507620db658a3d55c367cc8273e2ee24 - |
|
undeath |
Very old oclHashcat-plus Support
|
11 |
23,632 |
05-24-2012, 12:57 AM |
|
|
Thread: Cracking salted md5
Post: RE: Cracking salted md5
format is hash:salt
how the salt looks like doesn't matter |
|
undeath |
Old oclHashcat Support
|
2 |
21,215 |
05-11-2014, 10:58 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
format is hash:salt, hash in hex format, salt in binary (if you have non-ascii characters specify the salt in hex and use --hex-salt)
Your hash file has a BOM, you need to remove that. |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 04:08 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
It's possible your salt is longer than the maximum hashcat expects. How long is it? If your hex-encoded salt is indeed five characters long something is wrong. |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 05:35 PM |