Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Either it's not hex-encoded data but rather ascii-data that happens to use hexadecimal alphabet or you are missing parts. Hex encoding uses two hexadecimal letters to encode one byte. Valid hex-data c... |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 06:12 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
don't use --hex-salt if your salt is not hex-encoded |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 06:35 PM |
|
|
Thread: Cracking sha1 with two different salts
Post: RE: Cracking sha1 with two different salts
This mode is available in the beta version as 19300. https://hashcat.net/beta/ or https://github.com/hashcat/hashcat |
|
undeath |
hashcat
|
4 |
1,578 |
11-27-2019, 04:40 PM |
|
|
Thread: Cracking sha1 with two different salts
Post: RE: Cracking sha1 with two different salts
Code:
--
hashcat (v5.1.0) starting...
--
you are not running a beta version |
|
undeath |
hashcat
|
4 |
1,578 |
11-27-2019, 05:27 PM |
|
|
Thread: Cracking spammer hashes
Post: RE: Cracking spammer hashes
Why don't you modify the shells to email you the password as soon as someone logs into it? |
|
undeath |
General Talk
|
2 |
6,286 |
10-22-2014, 09:23 PM |
|
|
Thread: Cracking speed
Post: RE: Cracking speed
I don't think you read the speed output correctly. On my CPU hashcat was something between 3 and 5 times faster than aircrack. Depending on how many cores your CPU has this may vary. |
|
undeath |
Old hashcat Support
|
3 |
10,531 |
07-06-2014, 06:17 PM |
|
|
Thread: Cracking Turkish/Foreign Hashes
Post: RE: Cracking Turkish/Foreign Hashes
for the love of Cthulhu stop using python2
python3:
Code:
--
m = hashlib.md5()
m.update("ĞĞ".encode('utf-8'))
print(m.hexdigest())
--
|
|
undeath |
hashcat
|
2 |
2,375 |
05-21-2018, 10:45 AM |
|
|
Thread: Crackpos incorrect
Post: RE: Crackpos incorrect
since the axes' labels are missing it's hard to tell what that chart is about at all. What is wrong with the red/green curves? Is this about the smallest crackpos being reported? If so, "number of gue... |
|
undeath |
hashcat
|
12 |
5,625 |
02-15-2019, 08:00 PM |
|
|
Thread: Crackpos incorrect
Post: RE: Crackpos incorrect
You are confusing crackpos with the number of guesses made. There are no guarantees that a lower crackpos means it's tried earlier, or analogously that a higher crackpos means some candidate is tried ... |
|
undeath |
hashcat
|
12 |
5,625 |
02-15-2019, 09:24 PM |
|
|
Thread: Crackpos incorrect
Post: RE: Crackpos incorrect
speed should be almost constant over time, you would usually end up with pretty much a straight line if you tried to plot the guesses made. |
|
undeath |
hashcat
|
12 |
5,625 |
02-15-2019, 09:35 PM |
|
|
Thread: Crackpos incorrect
Post: RE: Crackpos incorrect
you could externally monitor the outfile and track the amount of hashes cracked over time. |
|
undeath |
hashcat
|
12 |
5,625 |
02-16-2019, 12:10 PM |
|
|
Thread: Cram-md5 supported
Post: RE: Cram-md5 supported
|
undeath |
General Help
|
4 |
8,439 |
12-09-2012, 07:49 PM |
|
|
Thread: Create a fast WORD->HASH lookup
Post: RE: Create a fast WORD->HASH lookup
That's not possible with hashcat. What you are trying to create is a stupid version of a rainbow table. For fast hashes such as plain MD5 it's going to be faster to re-calculate the hashes than to sto... |
|
undeath |
hashcat
|
1 |
1,988 |
12-24-2017, 01:23 PM |
|
|
Thread: create files "*. Hcmask"!?
Post: RE: create files "*. Hcmask"!?
put all masks you want to run into a txt file and save as .hcmask |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
19,471 |
07-07-2014, 12:25 AM |
|
|
Thread: create files "*. Hcmask"!?
Post: RE: create files "*. Hcmask"!?
PACK is multiplatform, but you need to install python: https://www.python.org/download/releases/2.7.8/ |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
19,471 |
07-07-2014, 06:18 PM |
|
|
Thread: Create proper mask
Post: RE: Create proper mask
create a mask that covers the maximum length and then add "-i --increment-min=8" to the command line. |
|
undeath |
General Help
|
1 |
3,855 |
08-10-2014, 10:16 PM |
|
|
Thread: creating a wordlist
Post: RE: creating a wordlist
It's probably easiest to write a custom script to generate the mutated phrases. |
|
undeath |
hashcat
|
2 |
3,055 |
05-02-2017, 04:45 PM |
|
|
Thread: crunch hashcat piping WPA cracking not working
Post: RE: crunch hashcat piping WPA cracking not working
Even if it did work, your computer will break before this command ever completes. |
|
undeath |
hashcat
|
4 |
9,123 |
06-21-2017, 06:04 PM |
|
|
Thread: Cryptainer
Post: RE: Cryptainer
Is the file format and encryption scheme publicly documented or reverse engineered? If not, no. |
|
undeath |
hashcat
|
1 |
2,410 |
03-23-2018, 08:14 PM |
|
|
Thread: Crypto Miner Conversion
Post: RE: Crypto Miner Conversion
Atticuss Wrote: (02-23-2015, 10:55 PM)
--
Does it come down to something as simple as hash type?
--
exactly.
Atticuss Wrote: (02-23-2015, 10:55 PM)
--
And since I plan to do distributed, do you k... |
|
undeath |
Hardware
|
11 |
20,081 |
02-23-2015, 11:27 PM |