Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password
You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix. |
|
undeath |
hashcat
|
5 |
3,849 |
03-18-2018, 10:38 AM |
|
|
Thread: Value of --pw-max must be smaller or equal to 32
Post: RE: Value of --pw-max must be smaller or equal to ...
the cause for this problem is that your password candidates may only be up to 32 bytes long. |
|
undeath |
Old hashcat Support
|
12 |
16,016 |
12-06-2015, 08:48 PM |
|
|
Thread: Value of --pw-max must be smaller or equal to 32
Post: RE: Value of --pw-max must be smaller or equal to ...
not with hashcat, correct. |
|
undeath |
Old hashcat Support
|
12 |
16,016 |
12-06-2015, 09:12 PM |
|
|
Thread: v1.33 is much slower than v1.21,Can anyone test it
Post: RE: v1.33 is much slower than v1.21,Can anyone tes...
did you read this thread? https://hashcat.net/forum/thread-4161.html |
|
undeath |
Old oclHashcat Support
|
4 |
7,885 |
03-06-2015, 03:52 PM |
|
|
Thread: Utilising the gpu in a headless envrionment
Post: RE: Utilising the gpu in a headless envrionment
this works for amd, too, but you won't have temp (and/or utilization?) shown for amd cards. |
|
undeath |
General Help
|
3 |
7,145 |
06-20-2014, 06:33 PM |
|
|
Thread: Using WPA2 DK PSK (derrived Key) instead of 4Way Handshake
Post: RE: Using WPA2 DK PSK (derrived Key) instead of 4W...
PBKDF2(Passphrase,SSID,SSID.length,2096,256)
This does not describe anything. PBKDF2 needs a hashing algorithm. To answer your question: hashcat has no generic handler for PBKDF2. |
|
undeath |
Old oclHashcat Support
|
6 |
12,165 |
09-03-2014, 01:31 AM |
|
|
Thread: Using the new md5($salt.$pass.$salt) mode
Post: RE: Using the new md5($salt.$pass.$salt) mode
it only takes one salt as far as i can see. |
|
undeath |
Old oclHashcat Support
|
4 |
7,540 |
10-15-2014, 09:49 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
yes, performance is better with m20 if you have a static prefix.
hash format is usually
Code:
--
hexhash:salt
--
|
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:26 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
how did you create the hash? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 12:05 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 01:06 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4
Other than that the most time you can save by running clever attacks. |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 05:59 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
targeted wordlists, targeted rules, more narrow masks, … |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:24 PM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
You're missing "-m" in front of the hash mode and "--increment 17:19" is absolutely the wrong syntax. Where did you find that? |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-18-2019, 07:13 PM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
Code:
--
hashcat -h | grep increment
-i, --increment | | Enable mask increment mode |
--increment-min | Num | Start mask incrementing... |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-19-2019, 12:24 PM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
I don't think the mask 'part_I_remember?d?s' does what you want. It tries candidates that start with "part_I_remember" followed by exactly one digit followed by exactly one special character.
I gue... |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-19-2019, 05:09 PM |
|
|
Thread: using hashcat to generate file-checksums
Post: RE: using hashcat to generate file-checksums
File checksumming on gpu would make not much sense because PCIe throughput would be the bottleneck. Besides, GPUs are fast because they have so many cores and can do many computations parallelly. That... |
|
undeath |
General Talk
|
4 |
3,491 |
01-21-2018, 01:11 PM |
|
|
Thread: using hashcat to generate file-checksums
Post: RE: using hashcat to generate file-checksums
Sorry, I misread your statement about the bottleneck.
Most checksum functions are not designed to allow parallel processing of a single hashing operation and the sha1/2 familiy is one of that. (due... |
|
undeath |
General Talk
|
4 |
3,491 |
01-21-2018, 04:06 PM |
|
|
Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...
If you had used the forum's search function you could have learnt that ethereum support was added in version 3.6.0.
You can extract the necessary info from your wallet file using this script: https... |
|
undeath |
hashcat
|
21 |
25,960 |
06-18-2017, 08:31 PM |
|
|
Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...
You need to specify the correct hash mode (-m). To avoid any interference with your shell you best save the string in a text file. |
|
undeath |
hashcat
|
21 |
25,960 |
06-19-2017, 10:15 AM |
|
|
Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...
try using --scrypt-tmto 4 |
|
undeath |
hashcat
|
21 |
25,960 |
06-19-2017, 07:45 PM |