Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Save mask in wordlist
Post: RE: Save mask in wordlist
hashcat -a3 PAS?dWOR?d --stdout > list.txt |
|
undeath |
General Talk
|
1 |
929 |
01-03-2020, 10:41 PM |
|
|
Thread: save md5 generated hashes to the file ?
Post: RE: save md5 generated hashes to the file ?
No. If you want to waste your space with rainbow tables go to freerainbowtables.com. |
|
undeath |
Old oclHashcat Support
|
2 |
5,359 |
12-26-2014, 12:29 PM |
|
|
Thread: Save progress every x seconds-hashcat-cli64.exe
Post: RE: Save progress every x seconds-hashcat-cli64.ex...
when you kill hashcat it will tell you which -s value you need to use to resume the attack. |
|
undeath |
Old hashcat Support
|
5 |
12,586 |
10-19-2014, 06:33 PM |
|
|
Thread: Saving calculated hashes
Post: RE: Saving calculated hashes
you'd have to code that yourself. |
|
undeath |
General Talk
|
8 |
16,790 |
05-19-2013, 04:36 PM |
|
|
Thread: Scheduled checkpoint
Post: RE: Scheduled checkpoint
Hashcat will automatically update the restore file as soon as a checkpoint is reached. If you do not want to lose any progress and have some control over the shutdown process you can monitor the resto... |
|
undeath |
hashcat
|
3 |
1,669 |
06-18-2019, 05:23 PM |
|
|
Thread: Script or tool for hashing lines needed
Post: RE: Script or tool for hashing lines needed
|
undeath |
General Talk
|
4 |
1,596 |
09-25-2019, 09:31 PM |
|
|
Thread: Scrypt and TMTO question
Post: RE: Scrypt and TMTO question
Do you even know what TMTO means? It has nothing to do with n, p, r values. (what is r?) |
|
undeath |
Old oclHashcat Support
|
7 |
12,640 |
06-23-2015, 07:56 PM |
|
|
Thread: Scrypt and TMTO question
Post: RE: Scrypt and TMTO question
mrleau Wrote: (06-24-2015, 03:04 AM)
--
Please correct me if I'm wrong but it's Time Memory TradeOff and from my limited understanding is used to control Execution time and/or memory usage of the sc... |
|
undeath |
Old oclHashcat Support
|
7 |
12,640 |
06-24-2015, 06:58 PM |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
You have to reformat the hashes for cracking with hascat. Hashcat's format is SCRYPT:n:r:p:salt:hash
salt and hash are base64-encoded. I think hashcat only supports hash lengths of 32 bytes. You have... |
|
undeath |
hashcat
|
2 |
1,189 |
08-12-2019, 11:19 AM |
|
|
Thread: Searching very big word list
Post: RE: Searching very big word list
use the maskprocessor to generate your new favourite 50gb+ wordlist and suffer. |
|
undeath |
General Help
|
4 |
8,654 |
05-23-2013, 04:25 PM |
|
|
Thread: See output of oclhashcat
Post: RE: See output of oclhashcat
There is not. This is not really possible since the program is heavily multithreaded. |
|
undeath |
Old oclHashcat Support
|
3 |
5,570 |
03-19-2015, 12:50 AM |
|
|
Thread: segfault on --stdout
Post: RE: segfault on --stdout
gshumway Wrote: (09-30-2018, 08:35 PM)
--
So for -m 2500, 1234567 would get rejected, and so would every variation created by the rule, regardless of correct length. Do I have this right?
--
That's... |
|
undeath |
hashcat
|
4 |
3,011 |
10-01-2018, 12:20 AM |
|
|
Thread: segfault on --stdout
Post: RE: segfault on --stdout
Your syntax is correct. The only thing I can imagine is some incompatibility with debian testing and the binary build of hashcat. You can try compiling hashcat yourself or see if stdout works correctl... |
|
undeath |
hashcat
|
4 |
3,011 |
10-01-2018, 11:56 AM |
|
|
Thread: Segmentation fault (core dump) on --show and --left
Post: RE: Segmentation fault (core dump) on --show and -...
can reproduce
Code:
--
[ undeath@2600k: /tmp ] % ~> for i in `seq 20` ; do PW=`date "+%s%N%n%:::z%T" | md5sum | xxd -r -ps | base64 | cut -c1-13` ; echo "$PW" >> /tmp/plain ; echo -n "${PW}:" >> /... |
|
undeath |
Very old oclHashcat-plus Support
|
11 |
24,118 |
10-14-2012, 01:34 PM |
|
|
Thread: Segmentation fault [core dumped] by any execution.
Post: RE: Segmentation fault [core dumped] by any execut...
Remove pocl and try again. |
|
undeath |
hashcat
|
7 |
593 |
08-25-2020, 05:05 PM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
hashcat doesn't support that but I think maskprocessor has an option. |
|
undeath |
User Contributions
|
5 |
5,221 |
04-16-2018, 02:27 PM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
you can pipe the maskprocessor output to hashcat. no need to save anything to disk. |
|
undeath |
User Contributions
|
5 |
5,221 |
04-16-2018, 04:29 PM |
|
|
Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)
Code:
--
mp64 [options] | hashcat -a0 [options]
--
|
|
undeath |
User Contributions
|
5 |
5,221 |
04-17-2018, 11:44 AM |
|
|
Thread: separator unmatched
Post: RE: separator unmatched
Hard to say without knowing your command line but I suspect you switched the parameters for wordlist and hashlist. |
|
undeath |
hashcat
|
7 |
1,480 |
05-08-2020, 05:09 PM |
|
|
Thread: separator unmatched
Post: RE: separator unmatched
never use --force. if there are problems with hashcat fix them.
I have no idea what kind of hash you are trying to crack but two things seem obvious:
1. you need to use the correct hash mode for w... |
|
undeath |
hashcat
|
7 |
1,480 |
05-08-2020, 05:32 PM |