Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Mask attack with brain
Post: RE: Mask attack with brain
What's your whole command line? |
|
undeath |
hashcat
|
5 |
3,638 |
12-08-2018, 02:21 PM |
|
|
Thread: Mask attack with brain
Post: RE: Mask attack with brain
That indeed looks like a missing feature. Technically, when using brain-client-features=2 there should be no need to enable -S, but it looks like hashcat is still using it. |
|
undeath |
hashcat
|
5 |
3,638 |
12-08-2018, 07:36 PM |
|
|
Thread: Mask attack help
Post: RE: Mask attack help
zap44 Wrote: (02-11-2018, 01:04 AM)
--
Based on my limited knowledge, I know that the password is in the range of 60521739 -> 67646497 from the information above.
--
Wrong. Based on the information... |
|
undeath |
hashcat
|
5 |
6,232 |
02-11-2018, 01:09 AM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
1. Easier on a mathematical level? Yes. Easier on a practical level? No.
2. Pure hashcat masks cannot do this. maskprocessor has options for this.
3. (94^12 / $hashrate) will give you a rough, optim... |
|
undeath |
hashcat
|
7 |
2,034 |
09-30-2019, 09:51 PM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
-q 1 is redundant with -r 1
but according to your first post "rxMX8$cQ$4RZ" is a valid example (it includes two dollar signs), hence I assumed you were referring to consecutive occurrences. |
|
undeath |
hashcat
|
7 |
2,034 |
09-30-2019, 10:44 PM |
|
|
Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars
Not sure how you deduce your divisor to be 1.5 after determining your hashrate to be 3000 but your conclusion is correct nonetheless. |
|
undeath |
hashcat
|
7 |
2,034 |
10-01-2019, 09:07 PM |
|
|
Thread: Mask Attack
Post: RE: Mask Attack
Your description is pretty confused. Thread title says something about mask attack, yet you write about a wordlist of some kind.
Can you clarify what exactly you want to do? What is this wordlist y... |
|
undeath |
hashcat
|
5 |
1,789 |
12-24-2019, 04:04 PM |
|
|
Thread: Mask Attack
Post: RE: Mask Attack
princeprocessor (https://hashcat.net/wiki/doku.php?id=princeprocessor) does almost what you want but it will also use words multiple times, eg yumyumyum
To append the fixed part "24" you can add a ... |
|
undeath |
hashcat
|
5 |
1,789 |
01-01-2020, 12:25 PM |
|
|
Thread: Mask Assisstance
Post: RE: Mask Assisstance
A hybrid attack (mode 6) would make more sense. Get an english wordlist and use a mask like ?s20?d?d |
|
undeath |
General Talk
|
6 |
4,039 |
01-02-2018, 09:27 PM |
|
|
Thread: Mask Assisstance
Post: RE: Mask Assisstance
bruteforcing this keyspace is not going to happen any time soon unless the word is really short.
edit: 9 7 random lowercase characters? lol. not happening during your lifetime.
edit: whoops, I don... |
|
undeath |
General Talk
|
6 |
4,039 |
01-02-2018, 09:37 PM |
|
|
Thread: Mask >10 years for 11 char lowercase, decimal WPA2 hash
Post: RE: Mask >10 years for 11 char lowercase, decimal ...
|
undeath |
Old oclHashcat Support
|
5 |
7,691 |
03-08-2015, 02:27 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
What hash mode are you attacking? If it's a slow one the easiest way would be to have a rule double the word and append + prepend the known part. If you want to combine that with a mask attack you can... |
|
undeath |
hashcat
|
8 |
6,282 |
02-22-2018, 10:36 AM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
undeath |
hashcat
|
8 |
6,282 |
02-24-2018, 12:16 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
can you post your full command line? |
|
undeath |
hashcat
|
8 |
6,282 |
03-02-2018, 12:24 AM |
|
|
Thread: mask
Post: RE: mask
specify the path to that file instead of a mask |
|
undeath |
General Talk
|
2 |
2,453 |
06-30-2018, 10:03 AM |
|
|
Thread: markov threshold for second run through
Post: RE: markov threshold for second run through
no
There was an error posting your reply: The message is too short. Please enter a message longer than 5 characters. |
|
undeath |
General Help
|
2 |
4,753 |
07-30-2015, 02:20 AM |
|
|
Thread: markov mode
Post: RE: markov mode
Why are you using statsprocessor instead of hashcat's native markov support? Piping words in will almost always be slower. Also, you should specify a mask. |
|
undeath |
hashcat
|
6 |
1,079 |
05-22-2020, 10:25 PM |
|
|
Thread: Many symbols how separator (--separator)
Post: RE: Many symbols how separator (--separator)
Using mulitple delimiter characters isn't really a solution, just a workaround. Use hex-salt. |
|
undeath |
Old oclHashcat Support
|
2 |
4,281 |
02-13-2016, 02:12 PM |
|
|
Thread: Magento ?
Post: RE: Magento ?
according to that post it's md5(salt.pass) |
|
undeath |
General Help
|
2 |
8,690 |
07-19-2013, 09:07 AM |
|
|
Thread: m02500_aux1nullGBE): error: failed in Gen backend.
Post: RE: m02500_aux1nullGBE): error: failed in Gen back...
you should remove pocl and install the intel opencl cpu runtime |
|
undeath |
hashcat
|
7 |
2,592 |
11-21-2019, 07:57 PM |