Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
First, you need -r for every rule file you specify. However, the error you got seems like a opencl problem. is hashcat generally working? |
|
undeath |
hashcat
|
9 |
5,668 |
06-26-2018, 07:53 PM |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
mask attack/brute force should be your last resort, especially when you suspect the password is actually using a real word. Also that mask with --increment is going to try lots of invalid candidates. |
|
undeath |
hashcat
|
9 |
5,668 |
06-27-2018, 05:12 PM |
|
|
Thread: Rule-based Attack
Post: RE: Rule-based Attack
regarding your opencl problem, I have no idea what exactly is wrong but I highly suspect something with your driver is kaput. |
|
undeath |
hashcat
|
9 |
5,668 |
06-27-2018, 05:54 PM |
|
|
Thread: Rule syntax question
Post: RE: Rule syntax question
|
undeath |
General Help
|
9 |
12,636 |
02-20-2015, 11:25 PM |
|
|
Thread: Rule syntax question
Post: RE: Rule syntax question
rules only work on single characters (well, actually bytes), not character sequences. Rules are not delimited by whitespace. Whitespace is just for making them look nicer. |
|
undeath |
General Help
|
9 |
12,636 |
02-23-2015, 04:21 PM |
|
|
Thread: Rule Question
Post: RE: Rule Question
hashcat will not run the unmodified word unless a rule in the rules file returns the unmodified word again. |
|
undeath |
hashcat
|
3 |
1,245 |
08-26-2019, 04:05 PM |
|
|
Thread: Rule Piping Request
Post: RE: Rule Piping Request
how about using oclHashcat with -j option? |
|
undeath |
Feature Requests
|
20 |
45,531 |
11-17-2011, 09:46 PM |
|
|
Thread: Rule Piping Request
Post: RE: Rule Piping Request
the problem is not generating the rules at all but storing them. |
|
undeath |
Feature Requests
|
20 |
45,531 |
11-18-2011, 02:15 PM |
|
|
Thread: Rule new
Post: RE: Rule new
You don't want a rule, you want a mask matching a policy. Use PACK https://thesprawl.org/projects/pack/ |
|
undeath |
User Contributions
|
3 |
7,866 |
04-14-2015, 11:07 PM |
|
|
Thread: Rule insert
Post: RE: Rule insert
you need to write a custom rule file for your case. |
|
undeath |
General Talk
|
4 |
2,550 |
03-24-2019, 11:00 PM |
|
|
Thread: Rule insert
Post: RE: Rule insert
Use the i rule. All rules are equally fast for all intents and purposes. |
|
undeath |
General Talk
|
4 |
2,550 |
03-25-2019, 11:09 AM |
|
|
Thread: Rule help
Post: RE: Rule help
All rules marked with "+" in the notes do not work in newer versions. They only work in the legacy cpu version. |
|
undeath |
hashcat
|
5 |
4,934 |
05-14-2017, 03:11 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
royce Wrote: (04-22-2018, 07:51 PM)
--
even if you could cut the time in half (which would be much better than the keyspace reduction you're trying to do), will take a very very long time to run.
--
... |
|
undeath |
hashcat
|
6 |
4,323 |
04-22-2018, 08:25 PM |
|
|
Thread: Rtx 2080 max-q
Post: RE: Rtx 2080 max-q
Laptops are generally not recommended for use with hashcat. They are not designed to handle sustained high loads and will overheat and/or heat throttle quickly, damaging your hardware in the long run.... |
|
undeath |
Hardware
|
5 |
2,768 |
08-19-2019, 11:23 AM |
|
|
Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes
What is "rfc2898DeriveBytes" supposed to be? RFC2898 (https://tools.ietf.org/html/rfc2898) specifies mulitple KDFs, one of them being the supported PBKDF2 algorithm.
But anyway, all the algorithms ... |
|
undeath |
hashcat
|
4 |
2,994 |
10-01-2018, 11:51 AM |
|
|
Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes
check out https://hashcat.net/wiki/doku.php?id=example_hashes
modes 10900 11900 12000 12100 |
|
undeath |
hashcat
|
4 |
2,994 |
10-01-2018, 01:38 PM |
|
|
Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM
@ktinoulas: you are talking about an early-reject in the 5500 kernel. Looks like this is already implemented: https://github.com/hashcat/hashcat/blob/f6cfcbbc3a37e9b0ef9448f7d70f9013b65bd027/OpenCL/m0... |
|
undeath |
User Contributions
|
18 |
36,655 |
05-07-2018, 05:13 PM |
|
|
Thread: Reverse pass and hash on oclHashcat-plus
Post: RE: Reverse pass and hash on oclHashcat-plus
i don't think this is something to be handled by the hashcat engine.
Reversing a hash itself can be sone by a simple shell command. Reversing the word can be done by using the "r" rule. With the up... |
|
undeath |
Feature Requests
|
2 |
7,535 |
12-20-2011, 12:10 AM |
|
|
Thread: Return Code backwards
Post: RE: Return Code backwards
However it's inconsistent because 0 actually indicates a "successful" run (posix standard). |
|
undeath |
Very old oclHashcat-lite Support
|
3 |
9,111 |
11-03-2012, 11:59 AM |
|
|
Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...
32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7).
All other security properties are trivially fulfilled under... |
|
undeath |
hashcat
|
2 |
2,089 |
11-20-2018, 01:48 AM |