Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: error
Post: RE: error
Probably a problem with your opencl runtime. What device are you using? |
|
undeath |
hashcat
|
7 |
5,738 |
05-21-2018, 11:16 AM |
|
|
Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4
hashcat is free open source software. You can program the module yourself or hire someone to do it for you. |
|
undeath |
hashcat
|
8 |
3,432 |
09-13-2019, 12:59 PM |
|
|
Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...
Posting hashes is against the rules.
However, hash loads without problems for me. What's your command line? |
|
undeath |
Beta Tester
|
4 |
1,400 |
03-09-2020, 01:29 AM |
|
|
Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...
Code:
--
hashcat -h | grep -i electrum
16600 | Electrum Wallet (Salt-Type 1-3) | Password Managers
21700 | Electrum Wallet (Salt-Type 4) | Password Ma... |
|
undeath |
Beta Tester
|
4 |
1,400 |
03-09-2020, 01:54 AM |
|
|
Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?
if you only need to store user passwords, store a base64 encoded string of the hash. |
|
undeath |
General Talk
|
5 |
15,747 |
08-07-2012, 07:45 PM |
|
|
Thread: Efficiency Question - Wordlists or rules-on-the-fly
Post: RE: Efficiency Question - Wordlists or rules-on-th...
For slow hashes it does not really matter but for fast hashes piping is slower because everything needs to be transferred from CPU to GPU. |
|
undeath |
General Talk
|
1 |
3,518 |
02-03-2016, 09:48 PM |
|
|
Thread: Effects of unequal RAM and VRAM in rig
Post: RE: Effects of unequal RAM and VRAM in rig
Not enough RAM leads to CL_OUT_OF_HOST_MEMORY errors. It won't slow down things.
MD5/NTLM should be good candidates for stability testing, although there might be even better ones. |
|
undeath |
Hardware
|
1 |
1,960 |
09-25-2018, 02:23 PM |
|
|
Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing
Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical pr... |
|
undeath |
General Talk
|
4 |
4,982 |
09-10-2017, 06:08 PM |
|
|
Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing
According to this paper (https://dl.acm.org/citation.cfm?id=2011531) it would require 1000 qubits to break ECC-160.
As I said in my previous post, hashing algorithms are usually not vulnerable to q... |
|
undeath |
General Talk
|
4 |
4,982 |
09-11-2017, 04:12 PM |
|
|
Thread: Dusted off old gaming laptop
Post: RE: Dusted off old gaming laptop
|
undeath |
General Talk
|
3 |
980 |
04-27-2020, 10:26 PM |
|
|
Thread: DS2432 brute force
Post: RE: DS2432 brute force
a sha1 hash consists of 20 bytes so whatever you have there does not seem to be a sha1 hash at all. Actually I have never heard of a hash consisting of 8 bytes. (if your salt consists of 56 bytes it d... |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
12,415 |
12-08-2011, 03:43 AM |
|
|
Thread: DS2432 brute force
Post: RE: DS2432 brute force
as long as you expect the password to only consist of valid ascii characters with no specials or control characters the password should be bruteforced within some days using a recent gpu. But if you e... |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
12,415 |
12-08-2011, 04:14 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4. |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:50 AM |
|
|
Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack
oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e... |
|
undeath |
Beta Tester
|
11 |
10,338 |
08-13-2012, 10:53 AM |
|
|
Thread: drivers
Post: RE: drivers
there are plans, but unless AMD fixes their crappy drivers this will not happen. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
5,113 |
12-19-2012, 10:47 AM |
|
|
Thread: Double SHA1
Post: RE: Double SHA1
You could either code a custom hash mode for this or write a converter that generates all possible hashes from the concatenated numbers you have. |
|
undeath |
Old oclHashcat Support
|
9 |
13,637 |
06-20-2016, 05:40 PM |
|
|
Thread: Double Salted Hash - SHA1 and SHA256
Post: RE: Double Salted Hash - SHA1 and SHA256
this format is unsupported. |
|
undeath |
Old hashcat Support
|
1 |
6,325 |
12-05-2012, 12:46 AM |
|
|
Thread: double md5 not working
Post: RE: double md5 not working
damn, forgot to upgrade my drivers :/ Thank you. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
6,111 |
09-18-2012, 09:26 PM |
|
|
Thread: Done my research, now I need a review. 20 GPU cracking cluster.
Post: RE: Done my research, now I need a review. 20 GPU...
you can get a preconfigured system at https://sagitta.pw/ |
|
undeath |
Hardware
|
27 |
43,078 |
02-04-2016, 12:05 PM |
|
|
Thread: Don't work Sha-1(base-64)
Post: RE: Don't work Sha-1(base-64)
these are not exactly SHA1 hashes but base64(hex(sha1($pass))) ones. You need to base64-decode the hashes before you can crack them. |
|
undeath |
Old hashcat Support
|
6 |
12,366 |
01-18-2012, 10:03 PM |