Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Need help working with masks
Post: RE: Need help working with masks
you are mixing up masks and rules in a really weird way. This is what masks look like: https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
5 |
2,537 |
02-03-2019, 03:29 PM |
|
|
Thread: NEED HELP!!!!
Post: RE: NEED HELP!!!!
Might be throttling due to high temperatures and/or to reduce power consumption. 7990 is a shitty card. |
|
undeath |
hashcat
|
8 |
5,727 |
01-04-2018, 04:15 PM |
|
|
Thread: Need help, new to hashcat
Post: RE: Need help, new to hashcat
cracking a random password of such length is no feasible. |
|
undeath |
hashcat
|
2 |
2,532 |
06-29-2018, 02:07 AM |
|
|
Thread: Need Help: Trying to Brute Force a salted SHA1 hash for a geocaching puzzle.
Post: RE: Need Help: Trying to Brute Force a salted SHA1...
if you read the documentation/wiki/help you had realized -plus does not support masks (and only passwords up to 15 chars).
The need of double quotes around the string if spaces are used is not hash... |
|
undeath |
General Help
|
7 |
21,639 |
11-20-2011, 02:30 PM |
|
|
Thread: Need Help: Trying to Brute Force a salted SHA1 hash for a geocaching puzzle.
Post: RE: Need Help: Trying to Brute Force a salted SHA1...
|
undeath |
General Help
|
7 |
21,639 |
11-20-2011, 09:26 PM |
|
|
Thread: need HEX to ASCII convert
Post: RE: need HEX to ASCII convert
I got this from someone on IRC:
Code:
--
perl -ne 'if ($_ =~ m/\$HEX\[([A-Fa-f0-9]+)\]/) {print pack("H*", $1), "\n"}'
--
|
|
undeath |
General Help
|
2 |
10,068 |
07-04-2014, 04:30 PM |
|
|
Thread: Need some help
Post: RE: Need some help
|
undeath |
Old hashcat Support
|
6 |
12,851 |
06-29-2012, 09:07 AM |
|
|
Thread: Need to find X in SHA1[(AES-128(X)]
Post: RE: Need to find X in SHA1[(AES-128(X)]
|
undeath |
General Help
|
13 |
19,901 |
12-31-2014, 02:43 PM |
|
|
Thread: need to plain text of wpa2
Post: RE: need to plain text of wpa2
|
undeath |
Old hashcat Support
|
2 |
5,189 |
07-17-2015, 09:59 PM |
|
|
Thread: Netgear wordlist building
Post: RE: Netgear wordlist building
pipe combinator in hc and use num append rules. |
|
undeath |
General Help
|
1 |
5,839 |
10-13-2014, 01:53 AM |
|
|
Thread: network cluster cracking
Post: RE: network cluster cracking
You have 5tb of wordlists? There's your problem. |
|
undeath |
hashcat
|
7 |
8,330 |
10-10-2017, 01:16 PM |
|
|
Thread: network cluster cracking
Post: RE: network cluster cracking
Run your candidate generator on each computer running hashcat and use gate from hashcat-utils (https://hashcat.net/wiki/doku.php?id=hashcat_utils#gate) to split the workload. |
|
undeath |
hashcat
|
7 |
8,330 |
10-11-2017, 01:20 PM |
|
|
Thread: new 5700xt fails to benchmark
Post: RE: new 5700xt fails to benchmark
try with the beta at https://hashcat.net/beta/ |
|
undeath |
hashcat
|
2 |
1,285 |
12-04-2019, 01:54 PM |
|
|
Thread: New and learning
Post: RE: New and learning
according to epixoip's post one 7970 will do 130kH/s
therefore:
>>> (26**9)/130000/60/60/24
483.3959828148148
result in days. Two cards will halve the time. |
|
undeath |
Very old oclHashcat-plus Support
|
11 |
22,149 |
08-26-2013, 10:25 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
awdmesh Wrote: (08-06-2018, 01:43 PM)
--
Just curious - can you somehow run a word list against the PMKID?
--
hashcat usage for this hash mode is the same as for every other mode. |
|
undeath |
User Contributions
|
187 |
1,293,341 |
08-06-2018, 01:47 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
dominikg43g34 Wrote: (08-08-2018, 11:13 AM)
--
I'm using an Atheros chip, could this be the problem?
--
Atheros chips are in fact known to be buggy. See https://hashcat.net/forum/thread-6661-post-4... |
|
undeath |
User Contributions
|
187 |
1,293,341 |
08-08-2018, 11:46 AM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
anonymousy Wrote: (08-09-2018, 04:36 PM)
--
Hi all. When I try and run this I get "hcxdumptool: command not found". Is this likely to be a chipset issue or a Layer 8 issue?!
--
typical case of PEBK... |
|
undeath |
User Contributions
|
187 |
1,293,341 |
08-09-2018, 04:41 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
SP2005 Wrote: (08-22-2018, 02:00 PM)
--
Is that correct ?
--
No. Please review hashcat's attack modes and their usages. |
|
undeath |
User Contributions
|
187 |
1,293,341 |
08-22-2018, 02:54 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
This is a great feature!
atom Wrote: (09-30-2020, 12:13 PM)
--
Instead you would create 3 wordlists, each containing one of the passwords at the same line number. That's much easier to maintain (e... |
|
undeath |
Beta Tester
|
21 |
3,762 |
09-30-2020, 12:18 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
ciccio17 Wrote: (10-01-2020, 06:43 PM)
--
…
--
This attack mode is specifically designed for large salted hash lists. It doesn't make sense with single hashes. |
|
undeath |
Beta Tester
|
21 |
3,762 |
10-01-2020, 08:16 PM |