Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat
so, what did you do to provide more work? |
|
undeath |
Hardware
|
9 |
6,985 |
05-18-2018, 02:13 PM |
|
|
Thread: minimum password length with mask
Post: RE: minimum password length with mask
well this looks kinda strange
Code:
--
Hash.Type........: WPA/WPA2
Time.Started.....: Tue Jan 02 16:44:52 2018 (21 secs)
Time.Estimated...: Tue Jan 02 17:02:47 2018 (17 mins, 34 secs)
Guess.Mas... |
|
undeath |
hashcat
|
6 |
8,088 |
01-03-2018, 01:24 PM |
|
|
Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...
I'd invest in a simple calculator. |
|
undeath |
Hardware
|
10 |
8,020 |
05-08-2018, 09:54 PM |
|
|
Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...
yes, the password length in combination with "brute force" |
|
undeath |
Hardware
|
10 |
8,020 |
05-08-2018, 09:59 PM |
|
|
Thread: Min/Max Password Length
Post: RE: Min/Max Password Length
liquiz Wrote: (07-24-2013, 02:14 PM)
--
The plan is to bruteforce 1-8 then use oclhashcat for 8-16 and then use hashcat for 17+.
--
I lol'd. What's your keyspace like? 5 characters? |
|
undeath |
Old hashcat Support
|
3 |
15,782 |
07-24-2013, 06:29 PM |
|
|
Thread: Mildly damaged card still good for hashcat?
Post: RE: Mildly damaged card still good for hashcat?
Defective cards will cause false positives/false negatives or just outright crash, possibly after some time. |
|
undeath |
Hardware
|
1 |
1,494 |
02-25-2019, 01:15 PM |
|
|
Thread: Microsoft Azure Ubuntu. Problem with hashcat
Post: RE: Microsoft Azure Ubuntu. Problem with hashcat
When disconnecting ssh all programs running in the shell will usually be terminated. If you want a program to continue running you need to use a terminal emulator like screen or tmux or other techniqu... |
|
undeath |
hashcat
|
12 |
1,185 |
08-16-2020, 12:46 PM |
|
|
Thread: Meltdown and Spectre patches
Post: RE: Meltdown and Spectre patches
using the search function is hard. https://hashcat.net/forum/thread-7710.html?highlight=spectre |
|
undeath |
General Talk
|
1 |
662 |
05-10-2020, 01:59 AM |
|
|
Thread: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5 support for lite
Post: RE: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD...
i think this question was already asked and atom said these types of hashes are incompatible with the *-lite framework. |
|
undeath |
Feature Requests
|
5 |
14,717 |
05-22-2012, 03:51 PM |
|
|
Thread: MD5(Unix) bug
Post: RE: MD5(Unix) bug
sounds like a hardware defect |
|
undeath |
Very old oclHashcat-plus Support
|
5 |
10,038 |
10-14-2012, 05:45 PM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
you can try the OSC hash mode. |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,866 |
08-06-2012, 12:59 AM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
uhm, sorry. Seems like OSC is not supported by lite. Due to the way lite works you should not use a mask like 12345678?1?1?1?1 ... because lite relies on the first part of the plaintext not to be fixe... |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,866 |
08-06-2012, 01:26 AM |
|
|
Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks
OSC is md5(salt.pass), however it is not supported by lite. Read my other post. |
|
undeath |
Very old oclHashcat-lite Support
|
20 |
40,866 |
08-06-2012, 01:58 AM |
|
|
Thread: MD5(salt.pass)
Post: RE: MD5(salt.pass)
for GPU cracking you can try OSC, but it is probably limited to two character salts. |
|
undeath |
General Help
|
7 |
20,325 |
08-16-2012, 01:55 AM |
|
|
Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat
Either you implement a kernel on your own for such a hash mode or you do the encoding externally and pipe in the already base64-encoded words in a0 mode, but this will cost quite some performance and ... |
|
undeath |
hashcat
|
3 |
2,375 |
10-30-2018, 09:42 AM |
|
|
Thread: md5($salt1,password,$salt2) ?
Post: RE: md5($salt1,password,$salt2) ?
Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule. |
|
undeath |
hashcat
|
5 |
3,104 |
11-09-2018, 12:20 PM |
|
|
Thread: MD5($salt.$pass) hashcat syntax, help?
Post: RE: MD5($salt.$pass) hashcat syntax, help?
I would suggest verifying the hash mode. Works for me. |
|
undeath |
General Talk
|
4 |
22,428 |
12-29-2017, 11:50 PM |
|
|
Thread: MD5 With salt how to save only cracked hash with email etc
Post: RE: MD5 With salt how to save only cracked hash wi...
incorrect hash mode and/or missing salt |
|
undeath |
hashcat
|
4 |
3,080 |
04-14-2018, 08:04 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind should be able to handle this |
|
undeath |
hashcat
|
6 |
2,051 |
10-31-2019, 12:08 PM |
|
|
Thread: MD5 mask for password
Post: RE: MD5 mask for password
pbies Wrote: (06-27-2018, 05:31 PM)
--
Is it possible to bypass such computation?
--
you can modify the source code
pbies Wrote: (06-27-2018, 05:31 PM)
--
For a good desktop PC is it possible to ... |
|
undeath |
hashcat
|
3 |
2,962 |
06-27-2018, 05:39 PM |