Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Begginer cracking
Post: RE: Begginer cracking
here is a benchmark, do the math yourself :) https://hashcat.net/forum/thread-6743-post-36041.html#pid36041 |
|
undeath |
Hardware
|
6 |
5,746 |
03-22-2018, 07:57 PM |
|
|
Thread: bcrypt salt format
Post: RE: bcrypt salt format
Thanks for uncovering that, philsmd. Why are people so stupid? Security by obscurity ftw
edit: looks like this is from a leaked database |
|
undeath |
hashcat
|
4 |
4,539 |
12-09-2017, 12:20 PM |
|
|
Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix
if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4 |
|
undeath |
General Talk
|
2 |
2,127 |
09-27-2018, 04:14 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
https://hashcat.net/forum/thread-7686.html?highlight=stdin |
|
undeath |
hashcat
|
12 |
18,675 |
11-21-2018, 11:43 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
brute-forcing bcrypt is not feasible. |
|
undeath |
hashcat
|
12 |
18,675 |
11-22-2018, 05:36 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible. |
|
undeath |
hashcat
|
12 |
18,675 |
11-22-2018, 06:14 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Mem5 Wrote: (11-23-2018, 12:14 AM)
--
Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds.
--
With cost factor 12? I think you're being a little too optimistic :D |
|
undeath |
hashcat
|
12 |
18,675 |
11-23-2018, 04:50 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel. |
|
undeath |
hashcat
|
12 |
18,675 |
11-28-2018, 02:41 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
is anything unclear about this warning?
Code:
--
* Device #2: Skipping unstable hash-mode 3200 for this device.
You can use --force to override, but do not report related errors.
--
|
|
undeath |
hashcat
|
5 |
5,603 |
02-27-2018, 06:36 PM |
|
|
Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash
ok, I'll translate the message for you:
Quote:
--
hash mode 3200 is known to be broken on this device. I'm refusing to run it. If you still want to run this hash mode on your broken device you can d... |
|
undeath |
hashcat
|
5 |
5,603 |
02-27-2018, 06:53 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
i don't know what Y is, but bcrypt has its native salt encoded in the hash string. If you have an additional salt that is non-standard and you have to do non-standard things. |
|
undeath |
hashcat
|
8 |
5,602 |
07-12-2018, 06:54 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
What command are you running to crack the example hash and what output do you receive? |
|
undeath |
hashcat
|
8 |
5,602 |
07-15-2018, 05:45 PM |
|
|
Thread: bcript+salt?
Post: RE: bcript+salt?
Don't install the sdk, only install the normal driver. |
|
undeath |
hashcat
|
8 |
5,602 |
07-16-2018, 03:53 PM |
|
|
Thread: Basic Questions - Hashs
Post: RE: Basic Questions - Hashs
You are very inpatient. Also this forum is about cracking hashes, not acquiring some. |
|
undeath |
General Help
|
5 |
9,892 |
10-18-2012, 09:52 PM |
|
|
Thread: basic question hardware build
Post: RE: basic question hardware build
unless you need cpu cracking the cpu isn't important at all. 2gb of ram are also sufficient. All that matters is vram. You don't need a fast harddisk either. Even PCIe x1 would be enough per card. If ... |
|
undeath |
Hardware
|
2 |
5,765 |
01-27-2014, 04:37 PM |
|
|
Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw
It's a bunch of base64-encoded binary data but that's really all you can say. What makes you think it's hashes at all? |
|
undeath |
hashcat
|
6 |
5,011 |
05-21-2018, 08:39 PM |
|
|
Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw
Wouldn't some kind of encryption be much more likely, given that it seems to store some kind of extractable information? |
|
undeath |
hashcat
|
6 |
5,011 |
05-21-2018, 11:33 PM |
|
|
Thread: Base password permutations
Post: RE: Base password permutations
generate rule files with rules for what you want to do |
|
undeath |
General Talk
|
2 |
2,148 |
09-17-2018, 11:23 PM |
|
|
Thread: backslash(\) slow down md5 speed
Post: RE: backslash(\) slow down md5 speed
Static prefixes in a mask attack slow down the attack, that's a known limitation in hashcat. Avoid static prefixes if possible and try to change your attack. |
|
undeath |
General Talk
|
2 |
2,317 |
11-11-2018, 02:21 AM |
|
|
Thread: Axcrypt support
Post: RE: Axcrypt support
if the example hash does not have keyfile data it's quite likely that this feature is not supported by hashcat. |
|
undeath |
hashcat
|
28 |
15,225 |
06-27-2018, 11:49 PM |