Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
format is hash:salt, hash in hex format, salt in binary (if you have non-ascii characters specify the salt in hex and use --hex-salt)
Your hash file has a BOM, you need to remove that. |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 04:08 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
It's possible your salt is longer than the maximum hashcat expects. How long is it? If your hex-encoded salt is indeed five characters long something is wrong. |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 05:35 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Either it's not hex-encoded data but rather ascii-data that happens to use hexadecimal alphabet or you are missing parts. Hex encoding uses two hexadecimal letters to encode one byte. Valid hex-data c... |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 06:12 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
don't use --hex-salt if your salt is not hex-encoded |
|
undeath |
hashcat
|
14 |
19,731 |
06-28-2018, 06:35 PM |
|
|
Thread: Cracking salted md5
Post: RE: Cracking salted md5
format is hash:salt
how the salt looks like doesn't matter |
|
undeath |
Old oclHashcat Support
|
2 |
21,215 |
05-11-2014, 10:58 PM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
yep, your plain is wrong.
echo -n 'ьфдщн' | md5sum
507620db658a3d55c367cc8273e2ee24 - |
|
undeath |
Very old oclHashcat-plus Support
|
11 |
23,632 |
05-24-2012, 12:57 AM |
|
|
Thread: Cracking LM
Post: RE: Cracking LM
what driver do you have installed?
might be connected to this? https://hashcat.net/forum/thread-1173.html |
|
undeath |
Very old oclHashcat-plus Support
|
8 |
33,383 |
05-28-2012, 06:24 PM |
|
|
Thread: Cracking in Google Cloud Instance Questions.
Post: RE: Cracking in Google Cloud Instance Questions.
Code:
--
[email protected]:~/hashcat-4.2.1$ clinfo
Number of platforms 0
--
well, there's your problem. opencl runtime isn't installed or working. |
|
undeath |
Hardware
|
17 |
14,865 |
09-26-2018, 11:52 PM |
|
|
Thread: cracking hashs how to ignore user name??
Post: RE: cracking hashs how to ignore user name??
you have to format it myusername:hash:salt and use the --username switch. |
|
undeath |
Old hashcat Support
|
4 |
9,905 |
04-22-2012, 02:13 PM |
|
|
Thread: cracking hashs how to ignore user name??
Post: RE: cracking hashs how to ignore user name??
you format it like
myusername:hash:salt
and start hashcat with the --username switch |
|
undeath |
Old hashcat Support
|
4 |
9,905 |
04-22-2012, 02:29 PM |
|
|
Thread: Cracking failed on Radeon Pro WX5100
Post: RE: Cracking failed on Radeon Pro WX5100
please post the full hashcat output of a cracking attempt. |
|
undeath |
hashcat
|
5 |
6,864 |
05-09-2017, 02:30 PM |
|
|
Thread: Cracking ethereum wallet password
Post: RE: Cracking ethereum wallet password
first, do not post hashes.
second, you are not specifying an attack mode and corresponding settings, hence hashcat defaults to stdin mode with a0. |
|
undeath |
hashcat
|
3 |
5,572 |
12-20-2017, 03:56 PM |
|
|
Thread: Cracking ethereum wallet password
Post: RE: Cracking ethereum wallet password
If you don't specify a mask hashcat will use a default one which is probably not what you want. Anyway, cracking such a wallet with bf is near impossible unless the password is very short (and you kno... |
|
undeath |
hashcat
|
3 |
5,572 |
12-20-2017, 04:36 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
Pure masks don't support this but you can create a hcmask file with policygen from PACK: https://github.com/iphelix/PACK |
|
undeath |
hashcat
|
7 |
1,538 |
05-11-2020, 01:04 AM |
|
|
Thread: Cracking a SHA-256 hash
Post: RE: Cracking a SHA-256 hash
1. how to crack? A: https://hashcat.net/wiki/
2. is SHA-256 a safe PSA? A: No.
2.b What is better? A: (pbkdf2), bcrypt, scrypt, argon2 (weak -> strong)
3. Does that matter for a password with 36^64 po... |
|
undeath |
General Help
|
1 |
25,921 |
05-28-2016, 07:25 PM |
|
|
Thread: cracking a domain cachedump
Post: RE: cracking a domain cachedump
slawson Wrote: (11-08-2014, 04:44 AM)
--
If I have a hash from a Domain Credentials cache dump, can I crack it by using either hash type 1000 or 1100? My testing shows that cracking via type 1100 is... |
|
undeath |
Old oclHashcat Support
|
6 |
16,230 |
11-08-2014, 02:38 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
this worked
./hashcat64.bin -m4800 -a3 777f2a3f6a2e661947b520c6777e0b25:45c915d82d67257209048420a31292d3:00 password |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:30 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
hashcat runs on any device supporting opencl, which includes modern CPUs and GPUs. You just need to install the correct opencl runtime for the device.
If you want others to help you with cracking y... |
|
undeath |
hashcat
|
21 |
17,277 |
02-10-2018, 11:20 PM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 12:48 AM |
|
|
Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius
yes, the challenge is required in order to crack the hash. |
|
undeath |
hashcat
|
21 |
17,277 |
02-12-2018, 01:01 AM |