Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Yet another "No hashes loaded"
Post: RE: Yet another "No hashes loaded"
are you using the correct mode? |
|
undeath |
Old oclHashcat Support
|
3 |
10,195 |
05-25-2015, 01:54 AM |
|
|
Thread: XNMI rule function is not working ?
Post: RE: XNMI rule function is not working ?
rules annotated with "+" on the rules wiki page (https://hashcat.net/wiki/doku.php?id=rule_based_attack) only work with the legacy hashcat-cpu version. |
|
undeath |
hashcat
|
3 |
1,193 |
09-27-2019, 04:42 PM |
|
|
Thread: Wrong Time Estimated with -w 4 parameter
Post: RE: Wrong Time Estimated with -w 4 parameter
There can be lots of reasons for this. Some other program may have used the GPU within those four hours, leading to a temporary speed drop. Or maybe thermal throttling kicked in, slowing the cards dow... |
|
undeath |
hashcat
|
4 |
2,730 |
09-04-2018, 04:20 PM |
|
|
Thread: WPA2 Enterprise ?
Post: RE: WPA2 Enterprise ?
WPA Enterprise uses IEEE 802.1X. Most widespread implementations are based on TLS. |
|
undeath |
General Help
|
3 |
7,123 |
06-22-2014, 12:44 PM |
|
|
Thread: WPA2 crack rules
Post: RE: WPA2 crack rules
That's quite tricky. *hashcat has no functionality to archive this. You can try to use https://www.thesprawl.org/projects/pack/ to generate some mask files or try creating a specific wordlist for this... |
|
undeath |
Old oclHashcat Support
|
6 |
9,333 |
10-13-2015, 12:46 PM |
|
|
Thread: WPA2 Bruteforce.
Post: RE: WPA2 Bruteforce.
If you need to match such password policies you will need to use PACK https://thesprawl.org/projects/pack/ |
|
undeath |
Old oclHashcat Support
|
2 |
6,379 |
07-17-2015, 03:01 PM |
|
|
Thread: WPA/WPA2: Making it feasable?
Post: RE: WPA/WPA2: Making it feasable?
if it is truly random no. |
|
undeath |
General Help
|
2 |
5,556 |
05-06-2014, 10:35 PM |
|
|
Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?
if you want to crack WPA on cpu you have to use aircrack. |
|
undeath |
Very old oclHashcat-plus Support
|
9 |
23,914 |
01-10-2013, 04:41 PM |
|
|
Thread: WPA/WPA2 using PMK 2501
Post: RE: WPA/WPA2 using PMK 2501
Please don't hijack unrelated threads. And why don't you try to run the commands instead of asking if you can? |
|
undeath |
hashcat
|
3 |
3,234 |
08-06-2018, 10:12 PM |
|
|
Thread: WPA/WPA2 in hashcat
Post: RE: WPA/WPA2 in hashcat
isn't aircrack good enough for such easy tasks? I think it accepts stdin wordlists, so this is easy to deal with in combination with maskprocessor. |
|
undeath |
Feature Requests
|
13 |
32,539 |
01-10-2013, 04:45 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
current version is 4.1.0
https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z |
|
undeath |
hashcat
|
9 |
6,762 |
02-22-2018, 09:35 PM |
|
|
Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...
so, are you on version 4.1.0 yet? |
|
undeath |
hashcat
|
9 |
6,762 |
02-22-2018, 10:13 PM |
|
|
Thread: WPA speed problem comparing to v1.31
Post: RE: WPA speed problem comparing to v1.31
Mem5 Wrote: (02-16-2015, 11:26 PM)
--
OK, but the 35% rejected was because passwords length were not between 8-64 chars ; so do you mean that v1.32 can test password 64 chars ?
--
No. Previous vers... |
|
undeath |
Old oclHashcat Support
|
8 |
14,758 |
02-17-2015, 03:30 PM |
|
|
Thread: Wpa speed dropping
Post: RE: Wpa speed dropping
possibly throttling because of bad cooling |
|
undeath |
General Talk
|
6 |
4,732 |
08-01-2018, 07:54 PM |
|
|
Thread: WPA restarting ten digit bruteforce
Post: RE: WPA restarting ten digit bruteforce
oclhashcat-plus does not have any option to resume. |
|
undeath |
General Talk
|
3 |
9,677 |
07-26-2012, 07:31 PM |
|
|
Thread: WPA masks
Post: RE: WPA masks
For WPA the speed difference is irrelevant. Also hashcat cannot further filter the candidates generated by the mask generator. |
|
undeath |
General Help
|
6 |
14,431 |
12-14-2012, 04:35 PM |
|
|
Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy
if hashcat can decrypt it so can anyone else. |
|
undeath |
Feature Requests
|
8 |
16,481 |
12-09-2012, 07:24 PM |
|
|
Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy
What i was referring to is that everyone is able to reverse engineer the binary executable and figure out how the file gets decrypted. It's about the same level of security as locking your car and hid... |
|
undeath |
Feature Requests
|
8 |
16,481 |
12-10-2012, 01:39 AM |
|
|
Thread: WPA help
Post: RE: WPA help
standard wpa(2) is mode 2500. Unless you know what PMK or PMKID means you don't need them. |
|
undeath |
General Talk
|
1 |
978 |
12-11-2019, 01:00 AM |
|
|
Thread: WPA crack not working in Windows Environment
Post: RE: WPA crack not working in Windows Environment
actually this sounds like a bug in the windows version (compiler bug?) |
|
undeath |
Old oclHashcat Support
|
10 |
25,133 |
10-29-2014, 09:27 PM |