Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
There is no generic answer to that, it depends on the software that put the info there. The password could be hashed, encrypted or simply encoded. |
|
undeath |
hashcat
|
7 |
2,039 |
11-08-2019, 06:01 PM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
this attack works:
Code:
--
hashcat -m10 $(python -c 'print("da8e187436ef310167021504d28c9b68"+":"+"00"*255)') -a3 '?b' --hex-salt
--
although hashcat's mask parser should probably be patched to all... |
|
undeath |
hashcat
|
6 |
2,043 |
10-09-2019, 06:06 PM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
There seems to be a bug with how hashcat processes hcmask files.
On the CLI this works:
Code:
--
hashcat -m0 da8e187436ef310167021504d28c9b68 -a3 "?b$(for x in $(seq 255) ; do echo -n 00; done)" --h... |
|
undeath |
hashcat
|
6 |
2,043 |
10-09-2019, 06:21 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind should be able to handle this |
|
undeath |
hashcat
|
6 |
2,051 |
10-31-2019, 12:08 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
You can use princeprocessor for this. It can handle everything but the space between the words. Toggling the case of the first character can be done with a hashcat rule. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:36 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
Yes, you could simply append a space to every word in your wordlist for that case. Just remember to add a rule in hashcat that deletes the trailing space of the last word. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:43 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-07-2020, 01:21 AM)
--
It would essentially be a brute force attack but with pre-generated passwords that one would use in a dict attack I guess.
--
I'm not sure what brou... |
|
undeath |
General Talk
|
10 |
2,064 |
07-07-2020, 10:02 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-06-2020, 12:00 PM)
--
Like taking already cracked passwords that were randomly generated and jumble them up or something like that?
--
That's what rule-based attacks do (... |
|
undeath |
General Talk
|
10 |
2,064 |
07-06-2020, 03:25 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file.
CracktainCrunch Wrote: (07-07-2020, 08:24 PM)
--
I u... |
|
undeath |
General Talk
|
10 |
2,064 |
07-08-2020, 08:29 PM |
|
|
Thread: Decoding multiple PMKID SSIDs
Post: RE: Decoding multiple PMKID SSIDs
wlanhcxinfo of https://github.com/ZerBea/hcxtools should be able to do all you need. |
|
undeath |
General Talk
|
4 |
2,073 |
10-13-2019, 12:07 PM |
|
|
Thread: Recommendation for building a Hash Cracking Rig in 2020?
Post: RE: Recommendation for building a Hash Cracking Ri...
Since the 2000 series FE cards are no longer recommended because they don't have a blower fan any longer and thus are not suitable for stacking multiple cards in one case.
For RAM the rule of thumb... |
|
undeath |
Hardware
|
4 |
2,074 |
07-08-2020, 08:49 PM |
|
|
Thread: GPU not utilised
Post: RE: GPU not utilised
srin2godisgreat Wrote: (10-07-2019, 08:40 PM)
--
From the output of the task manager and the status output of hashcat, it looks like only the cpu is being used.
--
I have no idea how you come to th... |
|
undeath |
hashcat
|
4 |
2,076 |
10-08-2019, 03:46 PM |
|
|
Thread: adding additional GPU to Brutalis | Hashstack
Post: RE: adding additional GPU to Brutalis | Hashstack
afaik you get an unrestricted usage license as long as you're a Sagitta HPC customer. But it's certainly something you should ask their sales department about directly. |
|
undeath |
Hardware
|
2 |
2,078 |
04-24-2019, 05:32 PM |
|
|
Thread: same attack, no results
Post: RE: same attack, no results
If you want to resume an attack you should use the session restore feature or the brain server. |
|
undeath |
hashcat
|
3 |
2,087 |
04-23-2019, 09:59 PM |
|
|
Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...
32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7).
All other security properties are trivially fulfilled under... |
|
undeath |
hashcat
|
2 |
2,089 |
11-20-2018, 01:48 AM |
|
|
Thread: Custom Hash Algorithm / Modify or Add new mode
Post: RE: Custom Hash Algorithm / Modify or Add new mode
No, those were manually re-hashed. |
|
undeath |
hashcat
|
3 |
2,091 |
08-22-2019, 04:13 PM |
|
|
Thread: Excel 2016 Workbook Hash
Post: RE: Excel 2016 Workbook Hash
hashcat can only crack passwords of encrypted office documents, not protected ones. |
|
undeath |
hashcat
|
2 |
2,112 |
05-27-2019, 07:23 PM |
|
|
Thread: hashcat64 4.2.1 getting killed OOM
Post: RE: hashcat64 4.2.1 getting killed OOM
Ideally you have as much RAM as you have VRAM. The lower limit for available system RAM hashcat requires was set to 2GB per opencl device if I remember correctly. (thus, running with only three device... |
|
undeath |
hashcat
|
2 |
2,121 |
09-17-2018, 10:46 PM |
|
|
Thread: How to configure a thin brute force in hashcat?
Post: RE: How to configure a thin brute force in hashcat...
|
undeath |
hashcat
|
2 |
2,124 |
12-08-2018, 11:50 PM |
|
|
Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix
if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4 |
|
undeath |
General Talk
|
2 |
2,127 |
09-27-2018, 04:14 PM |