Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: No need for complex password
Post: RE: No need for complex password
just to give you an idea of recently cracked passwords:
Code:
--
Happy Birthday dude!
claudia007claudia007
FuckTheFuckingFuckers
The wonderful wizard of oz
davidthisisnotmypassword
supersizefre... |
|
undeath |
General Help
|
8 |
15,450 |
06-07-2014, 10:25 PM |
|
|
Thread: No need for complex password
Post: RE: No need for complex password
Since oclHashcat has abandoned the 16 char limit for passwords these kind of passwords are not a challenge any more. With proper dicts and attack mode you can find them easily. Mainly just dict + rule... |
|
undeath |
General Help
|
8 |
15,450 |
06-09-2014, 10:35 AM |
|
|
Thread: No password candidates received in stdin mode, aborting...
Post: RE: No password candidates received in stdin mode,...
There are lots of options but none of those is a wordlist. |
|
undeath |
hashcat
|
10 |
8,861 |
02-13-2019, 12:02 PM |
|
|
Thread: No password candidates received in stdin mode, aborting...
Post: RE: No password candidates received in stdin mode,...
well, that much is clear. But you're running a wordlist attack. |
|
undeath |
hashcat
|
10 |
8,861 |
02-13-2019, 12:47 PM |
|
|
Thread: No password candidates received in stdin mode, aborting...
Post: RE: No password candidates received in stdin mode,...
Do you know that the password contains all those types of characters? If not, a wordlist attack with one of the larger rules files included in hashcat may do the job. |
|
undeath |
hashcat
|
10 |
8,861 |
02-13-2019, 05:56 PM |
|
|
Thread: Noob - Output Question
Post: RE: Noob - Output Question
just standard tech abbreviations. kilo, mega, giga 1 gH/s = 1000 mH/s = 1000*1000 kH/s = 1000*1000*1000 H/s |
|
undeath |
Hardware
|
4 |
6,901 |
01-29-2015, 01:15 AM |
|
|
Thread: Noob - Output Question
Post: RE: Noob - Output Question
You'll probably have lower power consumption but I guess the upgrade is not really worth it. |
|
undeath |
Hardware
|
4 |
6,901 |
01-29-2015, 12:05 PM |
|
|
Thread: nOOb help
Post: RE: nOOb help
Your best bet is using a wordlist attack + rules if you don't know anything and hope the password is found. Hashcat ships with a couple of rules files. |
|
undeath |
hashcat
|
12 |
8,107 |
01-23-2019, 12:20 PM |
|
|
Thread: noob problem installing
Post: RE: noob problem installing
copying stuff to /usr/bin is usually a bad idea (or actually anywhere outside your home directory, unless you know what you're doing).
Extract hashcat somewhere in your home directory (including al... |
|
undeath |
hashcat
|
7 |
5,179 |
09-04-2017, 07:59 PM |
|
|
Thread: noob problem installing
Post: RE: noob problem installing
always run it with full path |
|
undeath |
hashcat
|
7 |
5,179 |
09-04-2017, 09:00 PM |
|
|
Thread: noob problem installing
Post: RE: noob problem installing
well, that file should not be a link so you must have screwed up something. |
|
undeath |
hashcat
|
7 |
5,179 |
09-04-2017, 09:15 PM |
|
|
Thread: Noob question
Post: RE: Noob question
for mysql3 you better use https://www.tobtu.com/mysql323.php
It's way faster than hashcat. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
5,475 |
08-02-2013, 03:22 PM |
|
|
Thread: Noob question, bruteforce pmkid/wpa2 ISP default passwords
Post: RE: Noob question, bruteforce pmkid/wpa2 ISP defau...
without further knowledge that's hardly feasible. You might be interested in this thread: https://hashcat.net/forum/thread-6170.html
Other than that, here's the documentation for mask attacks: https:... |
|
undeath |
hashcat
|
1 |
944 |
09-20-2019, 01:09 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
hashcat doesn't magically find the file for you on your system. Give the full path if it's not in your cwd.
What does this have to do with /etc/shadow at all? |
|
undeath |
hashcat
|
12 |
7,528 |
10-30-2018, 09:18 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Don't use --force and report resulting problems on here. Fix your problems. |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 12:34 PM |
|
|
Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough
Well, remove --force and see what problems hashcat reports and fix them?! |
|
undeath |
hashcat
|
12 |
7,528 |
10-31-2018, 10:20 PM |
|
|
Thread: Noob: DES-OFB key recovery w/known contents
Post: RE: Noob: DES-OFB key recovery w/known contents
|
undeath |
hashcat
|
2 |
804 |
04-20-2020, 12:50 AM |
|
|
Thread: Not Cracking Passwords With Symbol Followed by Uppercase
Post: RE: Not Cracking Passwords With Symbol Followed by...
you did not specify a mask |
|
undeath |
Old oclHashcat Support
|
13 |
19,008 |
08-27-2014, 11:30 PM |
|
|
Thread: Not Cracking Passwords With Symbol Followed by Uppercase
Post: RE: Not Cracking Passwords With Symbol Followed by...
all you did with ?a was defining the custom mask ?1 (-1 ?a). I think hashcat has some mask it defaults to when the user does not specify one. |
|
undeath |
Old oclHashcat Support
|
13 |
19,008 |
08-28-2014, 01:21 AM |
|
|
Thread: Not Cracking Passwords With Symbol Followed by Uppercase
Post: RE: Not Cracking Passwords With Symbol Followed by...
What you wrote is correct, but you are not forced to use -1 -2 aso. ?a?a?a?a?a?a?a would be valid as well. |
|
undeath |
Old oclHashcat Support
|
13 |
19,008 |
08-28-2014, 02:39 AM |