Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Does not start Hashcat
Post: RE: Does not start Hashcat
No errors, just warnings. To fix get a new GPU. |
|
undeath |
hashcat
|
1 |
1,932 |
11-12-2017, 10:45 PM |
|
|
Thread: Domain Cached Credentials 2
Post: RE: Domain Cached Credentials 2
Windows 7 offlinely stores passwords with NTLM, are you sure it is DCC2? See example hashes here: https://hashcat.net/wiki/doku.php?id=example_hashes |
|
undeath |
Old oclHashcat Support
|
5 |
17,250 |
04-05-2014, 11:16 AM |
|
|
Thread: Don't work Sha-1(base-64)
Post: RE: Don't work Sha-1(base-64)
these are not exactly SHA1 hashes but base64(hex(sha1($pass))) ones. You need to base64-decode the hashes before you can crack them. |
|
undeath |
Old hashcat Support
|
6 |
12,366 |
01-18-2012, 10:03 PM |
|
|
Thread: Done my research, now I need a review. 20 GPU cracking cluster.
Post: RE: Done my research, now I need a review. 20 GPU...
you can get a preconfigured system at https://sagitta.pw/ |
|
undeath |
Hardware
|
27 |
43,078 |
02-04-2016, 12:05 PM |
|
|
Thread: double md5 not working
Post: RE: double md5 not working
damn, forgot to upgrade my drivers :/ Thank you. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
6,111 |
09-18-2012, 09:26 PM |
|
|
Thread: Double Salted Hash - SHA1 and SHA256
Post: RE: Double Salted Hash - SHA1 and SHA256
this format is unsupported. |
|
undeath |
Old hashcat Support
|
1 |
6,325 |
12-05-2012, 12:46 AM |
|
|
Thread: Double SHA1
Post: RE: Double SHA1
You could either code a custom hash mode for this or write a converter that generates all possible hashes from the concatenated numbers you have. |
|
undeath |
Old oclHashcat Support
|
9 |
13,637 |
06-20-2016, 05:40 PM |
|
|
Thread: drivers
Post: RE: drivers
there are plans, but unless AMD fixes their crappy drivers this will not happen. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
5,113 |
12-19-2012, 10:47 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4. |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:50 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e... |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:53 AM |
|
|
Thread: DS2432 brute force
Post: RE: DS2432 brute force
a sha1 hash consists of 20 bytes so whatever you have there does not seem to be a sha1 hash at all. Actually I have never heard of a hash consisting of 8 bytes. (if your salt consists of 56 bytes it d... |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
12,415 |
12-08-2011, 03:43 AM |
|
|
Thread: DS2432 brute force
Post: RE: DS2432 brute force
as long as you expect the password to only consist of valid ascii characters with no specials or control characters the password should be bruteforced within some days using a recent gpu. But if you e... |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
12,415 |
12-08-2011, 04:14 AM |
|
|
Thread: Dusted off old gaming laptop
Post: RE: Dusted off old gaming laptop
|
undeath |
General Talk
|
3 |
980 |
04-27-2020, 10:26 PM |
|
|
Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing
Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical pr... |
|
undeath |
General Talk
|
4 |
4,982 |
09-10-2017, 06:08 PM |
|
|
Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing
According to this paper (https://dl.acm.org/citation.cfm?id=2011531) it would require 1000 qubits to break ECC-160.
As I said in my previous post, hashing algorithms are usually not vulnerable to q... |
|
undeath |
General Talk
|
4 |
4,982 |
09-11-2017, 04:12 PM |
|
|
Thread: Effects of unequal RAM and VRAM in rig
Post: RE: Effects of unequal RAM and VRAM in rig
Not enough RAM leads to CL_OUT_OF_HOST_MEMORY errors. It won't slow down things.
MD5/NTLM should be good candidates for stability testing, although there might be even better ones. |
|
undeath |
Hardware
|
1 |
1,960 |
09-25-2018, 02:23 PM |
|
|
Thread: Efficiency Question - Wordlists or rules-on-the-fly
Post: RE: Efficiency Question - Wordlists or rules-on-th...
For slow hashes it does not really matter but for fast hashes piping is slower because everything needs to be transferred from CPU to GPU. |
|
undeath |
General Talk
|
1 |
3,518 |
02-03-2016, 09:48 PM |
|
|
Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?
if you only need to store user passwords, store a base64 encoded string of the hash. |
|
undeath |
General Talk
|
5 |
15,747 |
08-07-2012, 07:45 PM |
|
|
Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...
Posting hashes is against the rules.
However, hash loads without problems for me. What's your command line? |
|
undeath |
Beta Tester
|
4 |
1,400 |
03-09-2020, 01:29 AM |
|
|
Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...
Code:
--
hashcat -h | grep -i electrum
16600 | Electrum Wallet (Salt-Type 1-3) | Password Managers
21700 | Electrum Wallet (Salt-Type 4) | Password Ma... |
|
undeath |
Beta Tester
|
4 |
1,400 |
03-09-2020, 01:54 AM |