Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: NVIDIA and AMD on the same system?
Post: RE: NVIDIA and AMD on the same system?
You can use them all at once. |
|
undeath |
Hardware
|
7 |
7,273 |
09-05-2017, 06:34 PM |
|
|
Thread: NVIDIA and AMD on the same system?
Post: RE: NVIDIA and AMD on the same system?
Just install the drivers. |
|
undeath |
Hardware
|
7 |
7,273 |
09-05-2017, 11:18 PM |
|
|
Thread: NVIDIA and AMD on the same system?
Post: RE: NVIDIA and AMD on the same system?
They might be talking about available PCIe lanes for x16 or x8 speed but that's completely irrelevant for hashcat. It does not cause the system being unable to utilise those cards.
iirc AMD drivers... |
|
undeath |
Hardware
|
7 |
7,273 |
09-07-2017, 10:07 AM |
|
|
Thread: nVidia 1660 familly hashrates
Post: RE: nVidia 1660 familly hashrates
To use your CPU simply enable it with -d 1 (or -d 1,3 for cpu+gpu) |
|
undeath |
Hardware
|
5 |
2,198 |
02-11-2020, 06:38 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
Without any further info about the plaintext this is not possible to crack. Two slashes and only capital letters (and numbers and dots?) is not enough info at that length.
And don't use "decrypted" w... |
|
undeath |
hashcat
|
10 |
3,557 |
12-10-2019, 09:40 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
ok, so there are 4*36 possibilities per hash. That's perfectly doable, but you should write a small script instead of using hashcat for that. hashcat can't utilise its parallelisation well with that f... |
|
undeath |
hashcat
|
10 |
3,557 |
12-10-2019, 11:56 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
this code is not extraordinarily fast but should give you an idea:
Code:
--
#!/usr/bin/env python3
from sys import argv
from itertools import product
if len(argv) != 2:
print("usage: {} place... |
|
undeath |
hashcat
|
10 |
3,557 |
12-11-2019, 05:28 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
I can reproduce the error you are seeing, but only after the hash has been successfully cracked, hence hashcat exits early. |
|
undeath |
hashcat
|
10 |
3,557 |
12-16-2019, 01:00 PM |
|
|
Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED
From what I can see it the script should be able to handle that. Make sure the output word is among the printed candidates and if not we need to figure out why it isn't. |
|
undeath |
hashcat
|
10 |
3,557 |
12-28-2019, 11:01 PM |
|
|
Thread: NTLMv2 Request
Post: RE: NTLMv2 Request
nobody here will crack your hashes. try insidepro oder md5decrypter. |
|
undeath |
Feature Requests
|
1 |
5,972 |
12-19-2012, 03:10 PM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
Really, it would be useful if rejection based on min length can be disabled if there is no technical reason to do so. And for WPA there clearly isn't. |
|
undeath |
hashcat
|
19 |
9,937 |
08-31-2018, 08:10 PM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
Well, the thing is, hashcat does obviously not check the candidates but the input words, which is a significant difference. And only performing the check on the input words does not achieve any of the... |
|
undeath |
hashcat
|
19 |
9,937 |
08-31-2018, 08:36 PM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
As I said, an option to skip the check would be nice. Because as you have just demostrated the filter is very crude/imperfect and it can easily cause valid candidates to be skipped. And it does not pr... |
|
undeath |
hashcat
|
19 |
9,937 |
08-31-2018, 10:00 PM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
@royce: but that "better approach" would only include -S I suppose. Given that WPA, on faster hardware, will be throttled by this it's hardly a proper solution. |
|
undeath |
hashcat
|
19 |
9,937 |
09-03-2018, 11:30 AM |
|
|
Thread: NTLM Performance Problem
Post: RE: NTLM Performance Problem
That attack is not going to have good speed either, because static mask prefixes slow hashcat down. Generate a rules file for the mask part and do a wordlist+rules attack. |
|
undeath |
hashcat
|
7 |
3,012 |
01-04-2020, 12:56 PM |
|
|
Thread: NTLM hash, how practical is it?
Post: RE: NTLM hash, how practical is it?
ToJ Wrote: (02-22-2014, 01:34 AM)
--
I need the admin pwd (the one who set the pwd died, unfortunately).
--
If you only need to access the user account you can simply reset the password. Likely much... |
|
undeath |
General Help
|
12 |
21,943 |
02-22-2014, 11:20 AM |
|
|
Thread: NTLM
Post: RE: NTLM
yes, your hash file must only contain the hash itself. |
|
undeath |
Old hashcat Support
|
2 |
6,239 |
10-21-2012, 05:23 PM |
|
|
Thread: NT Passworder
Post: RE: NT Passworder
ever heard of pentesting? |
|
undeath |
General Talk
|
5 |
12,284 |
11-05-2012, 02:21 AM |
|
|
Thread: Not working after reboot
Post: RE: Not working after reboot
you shouldn't run hashcat (or almost any software) as root. Sounds like your file system got damaged, time for a fsck |
|
undeath |
hashcat
|
4 |
3,648 |
06-10-2018, 11:49 AM |
|
|
Thread: Not finding my own set password
Post: RE: Not finding my own set password
cannot reproduce with my hardware
Code:
--
OpenCL Platform #1: Intel(R) Corporation
========================================
* Device #1: AMD Ryzen 5 1600 Six-Core Processor.
OpenCL Platform ... |
|
undeath |
hashcat
|
12 |
6,010 |
12-15-2018, 11:04 PM |