Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Sorry but: TrueCrypt USB-Drive
Post: RE: Sorry but: TrueCrypt USB-Drive
Not sure why you tried skip=1993276928. According to the FAQ you need the first 512 bytes of /dev/sdc1.
Is your password 0123456789 or 123456789? Are you using a hidden volume? |
|
undeath |
hashcat
|
3 |
3,678 |
02-27-2018, 03:39 PM |
|
|
Thread: Sorry but: TrueCrypt USB-Drive
Post: RE: Sorry but: TrueCrypt USB-Drive
oh, I think I misread that for "first". Are you sure you are using the correct hash mode? I don't know what Truecrypt's default settings are. |
|
undeath |
hashcat
|
3 |
3,678 |
02-28-2018, 04:06 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
You can use princeprocessor for this. It can handle everything but the space between the words. Toggling the case of the first character can be done with a hashcat rule. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:36 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
Yes, you could simply append a space to every word in your wordlist for that case. Just remember to add a rule in hashcat that deletes the trailing space of the last word. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:43 PM |
|
|
Thread: Some problems, first exhausted now cant find my card
Post: RE: Some problems, first exhausted now cant find m...
If your WLAN password has more than 15 characters you cannot crack it using oclhashcat. It only supports plains up to 15 charaters. (maybe this answers your first question).
With the problem after ... |
|
undeath |
Very old oclHashcat-plus Support
|
3 |
8,867 |
03-24-2012, 04:43 PM |
|
|
Thread: Some interesting test 14100
Post: RE: Some interesting test 14100
You cannot do something like k1=k3 with a mask. |
|
undeath |
hashcat
|
5 |
1,319 |
04-28-2020, 02:19 AM |
|
|
Thread: some info about rules
Post: RE: some info about rules
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
1,274 |
09-07-2019, 12:07 PM |
|
|
Thread: some hardware questions for building a new rig
Post: RE: some hardware questions for building a new rig
The software shipped with Brutalis, Hashstack, has some limitations which is why it's still using 14.04. (a new version is already available internally afaik)
There is no good reason to use such an o... |
|
undeath |
Hardware
|
4 |
4,548 |
08-31-2017, 03:58 PM |
|
|
Thread: Software Encrypted Files
Post: RE: Software Encrypted Files
I don't know how exactly this update is supposed to be installed, but somewhere the encryption key must be supplied, if the file is encrypted at all.
Since it's apparently not you that supplies the e... |
|
undeath |
General Talk
|
2 |
2,218 |
09-02-2018, 11:28 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
Yes, you want to do a mask attack https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
25 |
21,257 |
08-08-2017, 11:43 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
slayerdiangelo Wrote: (08-08-2017, 03:21 PM)
--
You should use the mask processor and pipe the output to Hashcat.
--
Hashcat supports mask attacks in attack mode 3. No need to use external tools.
... |
|
undeath |
hashcat
|
25 |
21,257 |
08-08-2017, 04:20 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
depends, if your wallet is mode 15600 [$ethereum$p] use your GPU (mining rig) if your wallet is mode 15700 [$ethereum$s] use your CPU (gaming machine) still use your mining rig
(well, actually it mig... |
|
undeath |
hashcat
|
25 |
21,257 |
08-08-2017, 06:42 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
use https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/ethereum2john.py to extract the necessary info from your wallet
you're on the right track. To set the hash type consult --h... |
|
undeath |
hashcat
|
25 |
21,257 |
08-09-2017, 12:00 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
4 H/s is really slow. Something seems off. As written before, my old 2600k manages to get 13 H/s. But why not using your GPU? It's probably still at least as fast as your CPU. Note that it may take ~2... |
|
undeath |
hashcat
|
25 |
21,257 |
08-09-2017, 10:18 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
Did you try --scrypt-tmto=0? At least the example hash works for me with every tmto setting (though 0 is the fastest option on cpu and gpu in my scenario).
--force is only if you use an unsupported... |
|
undeath |
hashcat
|
25 |
21,257 |
08-09-2017, 05:38 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
I just learnt script-tmto=0 means auto-configuration, not disable tmto trade-offs alltogether. And furthermore, the higher the value the less RAM is used.
However, there might be an incompatibility w... |
|
undeath |
hashcat
|
25 |
21,257 |
08-10-2017, 04:55 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
take home message: the scrypt settings ethereum uses by default make GPU cracking mostly impossible. Just use your CPU. |
|
undeath |
hashcat
|
25 |
21,257 |
08-10-2017, 05:35 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
scrypt has three parameters. Depending on how those parameters are chosen it may or may not work on GPU. The parameters of your ethereum wallet don't. |
|
undeath |
hashcat
|
25 |
21,257 |
08-11-2017, 10:12 AM |
|
|
Thread: Snowden Files Cracked, Surprised?
Post: RE: Snowden Files Cracked, Surprised?
Just some numbers:
Cracking AES-128 at a speed of 10^18 tries per second (which is probably much faster than even the NSA can afford) takes an awful lot of time:
2**128/1000000000000000000/60/60/24/... |
|
undeath |
General Talk
|
4 |
8,059 |
06-14-2015, 02:35 PM |
|
|
Thread: SMF
Post: RE: SMF
121 is the hash mode for smf. you need the hash and the username. |
|
undeath |
General Help
|
3 |
9,425 |
05-10-2014, 09:55 PM |