Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
You can't run program code through an online translator… |
|
undeath |
hashcat
|
28 |
15,225 |
07-22-2018, 07:48 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
use python but download the python script straight from github |
|
undeath |
hashcat
|
28 |
15,225 |
07-24-2018, 08:41 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
Of course those numbers are not always identical. Otherwise there'd be no reason to include them in the hash string. There should not be any spaces anywhere. |
|
undeath |
hashcat
|
28 |
15,225 |
07-26-2018, 02:26 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
your order of commands is wrong. First hash file, then mask/wordlist. |
|
undeath |
hashcat
|
28 |
15,225 |
07-27-2018, 04:50 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
you have garbage characters at the beginning of the hash file. See the first two characters. Probably a BOM. If you use a proper text editor you can disable the BOM. |
|
undeath |
hashcat
|
28 |
15,225 |
07-29-2018, 07:47 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
laulaf Wrote: (07-31-2018, 05:46 PM)
--
Have you got some an exemple of software proper text editor ?
--
Notepad++ (https://notepad-plus-plus.org/) |
|
undeath |
hashcat
|
28 |
15,225 |
07-31-2018, 07:24 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
ANSI is alright, always use it for hash lists. UTF-8 only works when your text editor does not write a BOM (or has a way to disable it).
Your attack looks alright now. |
|
undeath |
hashcat
|
28 |
15,225 |
08-02-2018, 04:27 PM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
axcrypt is a highly iterated, thus slow, hash. Even for very fast hashes, brute-forcing more than 8 characters is hardly feasible. Brute-force is the last resort if you have no other options. |
|
undeath |
hashcat
|
28 |
15,225 |
08-03-2018, 11:38 AM |
|
|
Thread: axcrypt
Post: RE: axcrypt
no
There was an error posting your reply: The message is too short. Please enter a message longer than 5 characters. |
|
undeath |
Old oclHashcat Support
|
3 |
6,662 |
07-30-2015, 05:11 PM |
|
|
Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs
I don't know what made you think developer GPUs are superior for hashcracking. They aren't. |
|
undeath |
Hardware
|
6 |
1,401 |
06-26-2020, 03:59 PM |
|
|
Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs
Hashcat requires good integer performance. Developer cards usually only boost floating point performance, sometimes even at the cost of integer performance. Consumer GPUs are what work best for hashca... |
|
undeath |
Hardware
|
6 |
1,401 |
06-26-2020, 11:01 PM |
|
|
Thread: automatic password rule analysis and generation
Post: RE: automatic password rule analysis and generatio...
wow, that's a very cool article. Thanks for linking! |
|
undeath |
User Contributions
|
1 |
7,015 |
02-14-2013, 01:40 AM |
|
|
Thread: ATTENTION! OpenCL kernel self-test failed.
Post: RE: ATTENTION! OpenCL kernel self-test failed.
There's a problem with the 5.1.0 version and AMD cards. This problem is fixed in the beta version. |
|
undeath |
hashcat
|
31 |
12,819 |
08-28-2019, 10:14 AM |
|
|
Thread: Attack PMKID 16800 is slow
Post: RE: Attack PMKID 16800 is slow
That's what you can expect from mid range mobile hardware. Especially the md5/wpa ratio is absolutely normal. |
|
undeath |
hashcat
|
2 |
4,479 |
08-12-2018, 01:14 PM |
|
|
Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.
What is your full command line? How do you determine hashcat only using one device? |
|
undeath |
hashcat
|
6 |
1,682 |
03-09-2020, 06:18 PM |
|
|
Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.
You're not providing enough work to hashcat. Hashcat's performance highly depends on the left part of the attack. In a6 that means the wordlist. As a workaround you can either pipe in the words:
Cod... |
|
undeath |
hashcat
|
6 |
1,682 |
03-09-2020, 09:03 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
https://hashcat.net/faq/morework |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 11:30 AM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
I'm not implying anything, it's explained right in that FAQ article. Your mask is too small to be a useful amplifier for a very fast hash type like NTLM. |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 01:48 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
The left side of an attack has a higher impact on the performance than the right side. Since your left side for a7 only has 95 items you get worse performance than with the huge wordlist on a6. This i... |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 02:45 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
edit: ninja'd
Yes, the speed difference is because that's just how hashcat works and for fast hashes there is no good workaround. You may be able to achieve slightly better speed by using a0 with rul... |
|
undeath |
hashcat
|
9 |
3,546 |
02-11-2019, 03:12 PM |