Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: attack mode 1 and session restore?
Post: RE: attack mode 1 and session restore?
maybe you haven't reached a checkpoint yet? How far was the attack? |
|
undeath |
hashcat
|
4 |
2,632 |
10-05-2018, 10:02 PM |
|
|
Thread: attack mode 1 and session restore?
Post: RE: attack mode 1 and session restore?
I cannot reproduce this problem with the same hash mode on hashcat 4.2.1 and combinator attack.
Code:
--
$ hashcat64.bin -m2500 --session test /tmp/test.hccapx wordlists/1 wordlists/2 -a1
Session... |
|
undeath |
hashcat
|
4 |
2,632 |
10-07-2018, 12:57 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
https://hashcat.net/faq/morework |
|
undeath |
hashcat
|
9 |
3,544 |
02-11-2019, 11:30 AM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
I'm not implying anything, it's explained right in that FAQ article. Your mask is too small to be a useful amplifier for a very fast hash type like NTLM. |
|
undeath |
hashcat
|
9 |
3,544 |
02-11-2019, 01:48 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
The left side of an attack has a higher impact on the performance than the right side. Since your left side for a7 only has 95 items you get worse performance than with the huge wordlist on a6. This i... |
|
undeath |
hashcat
|
9 |
3,544 |
02-11-2019, 02:45 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
edit: ninja'd
Yes, the speed difference is because that's just how hashcat works and for fast hashes there is no good workaround. You may be able to achieve slightly better speed by using a0 with rul... |
|
undeath |
hashcat
|
9 |
3,544 |
02-11-2019, 03:12 PM |
|
|
Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.
What is your full command line? How do you determine hashcat only using one device? |
|
undeath |
hashcat
|
6 |
1,682 |
03-09-2020, 06:18 PM |
|
|
Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.
You're not providing enough work to hashcat. Hashcat's performance highly depends on the left part of the attack. In a6 that means the wordlist. As a workaround you can either pipe in the words:
Cod... |
|
undeath |
hashcat
|
6 |
1,682 |
03-09-2020, 09:03 PM |
|
|
Thread: Attack PMKID 16800 is slow
Post: RE: Attack PMKID 16800 is slow
That's what you can expect from mid range mobile hardware. Especially the md5/wpa ratio is absolutely normal. |
|
undeath |
hashcat
|
2 |
4,477 |
08-12-2018, 01:14 PM |
|
|
Thread: ATTENTION! OpenCL kernel self-test failed.
Post: RE: ATTENTION! OpenCL kernel self-test failed.
There's a problem with the 5.1.0 version and AMD cards. This problem is fixed in the beta version. |
|
undeath |
hashcat
|
31 |
12,818 |
08-28-2019, 10:14 AM |
|
|
Thread: automatic password rule analysis and generation
Post: RE: automatic password rule analysis and generatio...
wow, that's a very cool article. Thanks for linking! |
|
undeath |
User Contributions
|
1 |
7,015 |
02-14-2013, 01:40 AM |
|
|
Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs
I don't know what made you think developer GPUs are superior for hashcracking. They aren't. |
|
undeath |
Hardware
|
6 |
1,401 |
06-26-2020, 03:59 PM |
|
|
Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs
Hashcat requires good integer performance. Developer cards usually only boost floating point performance, sometimes even at the cost of integer performance. Consumer GPUs are what work best for hashca... |
|
undeath |
Hardware
|
6 |
1,401 |
06-26-2020, 11:01 PM |
|
|
Thread: axcrypt
Post: RE: axcrypt
no
There was an error posting your reply: The message is too short. Please enter a message longer than 5 characters. |
|
undeath |
Old oclHashcat Support
|
3 |
6,662 |
07-30-2015, 05:11 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
if the example hash does not have keyfile data it's quite likely that this feature is not supported by hashcat. |
|
undeath |
hashcat
|
28 |
15,225 |
06-27-2018, 11:49 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
You can't run program code through an online translator… |
|
undeath |
hashcat
|
28 |
15,225 |
07-22-2018, 07:48 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
use python but download the python script straight from github |
|
undeath |
hashcat
|
28 |
15,225 |
07-24-2018, 08:41 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
Of course those numbers are not always identical. Otherwise there'd be no reason to include them in the hash string. There should not be any spaces anywhere. |
|
undeath |
hashcat
|
28 |
15,225 |
07-26-2018, 02:26 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
your order of commands is wrong. First hash file, then mask/wordlist. |
|
undeath |
hashcat
|
28 |
15,225 |
07-27-2018, 04:50 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
you have garbage characters at the beginning of the hash file. See the first two characters. Probably a BOM. If you use a proper text editor you can disable the BOM. |
|
undeath |
hashcat
|
28 |
15,225 |
07-29-2018, 07:47 PM |