Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Combinator + Mask
Post: RE: Combinator + Mask
https://hashcat.net/forum/thread-9235-post-48849.html |
|
undeath |
General Talk
|
2 |
779 |
05-20-2020, 02:11 PM |
|
|
Thread: Brute-Force custom character
Post: RE: Brute-Force custom character
https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
2 |
790 |
05-17-2020, 12:04 AM |
|
|
Thread: 8char hash ?l?d
Post: RE: 8char hash ?l?d
Your command is correct, but according to your description 0 is not part of the plaintext, hence you should use -1 ?l123456789 |
|
undeath |
hashcat
|
1 |
798 |
12-28-2019, 09:17 PM |
|
|
Thread: Noob: DES-OFB key recovery w/known contents
Post: RE: Noob: DES-OFB key recovery w/known contents
|
undeath |
hashcat
|
2 |
802 |
04-20-2020, 12:50 AM |
|
|
Thread: Pregen PMKs using hashcat
Post: RE: Pregen PMKs using hashcat
It's not possible using hashcat. You need to use hcxtools. |
|
undeath |
hashcat
|
3 |
806 |
04-04-2020, 02:36 AM |
|
|
Thread: €-Symbol with Command ?b
Post: RE: €-Symbol with Command ?b
First, € is a utf-8 multibyte symbol and cannot be cracked on any hash mode with ?b. You'd need to use ?b?b?b. Second, NTLM uses utf-16 and hashcat does some very naive charset conversion that can o... |
|
undeath |
hashcat
|
4 |
807 |
06-16-2020, 08:36 PM |
|
|
Thread: €-Symbol with Command ?b
Post: RE: €-Symbol with Command ?b
You can use the MD4 hash mode to crack your hash:
Code:
--
./hashcat -m900 030926B781938DB4365D46ADC7CFBCB8 euro.txt --encoding-from=utf8 --encoding-to=utf16le
--
|
|
undeath |
hashcat
|
4 |
807 |
06-16-2020, 08:41 PM |
|
|
Thread: AesCrypt hash: How to obtain iv, enc_iv, enc_key, HMAC and encrypttion
Post: RE: How to obtain iv, enc_iv, enc_key, HMAC and en...
According to the error.png screenshot in your first post even AES Crypt itself doesn't recognize that file as a valid AES Crypt file. Either it was not created with AES Crypt or it has been damaged. |
|
undeath |
hashcat
|
5 |
809 |
07-08-2020, 09:27 PM |
|
|
Thread: 3des comand
Post: RE: 3des comand
that is the whole command. |
|
undeath |
hashcat
|
3 |
816 |
05-28-2020, 03:02 PM |
|
|
Thread: algo 20710
Post: RE: algo 20710
as written on the example hashes page, it's only available in the beta https://hashcat.net/beta/ |
|
undeath |
hashcat
|
2 |
828 |
04-13-2020, 10:25 PM |
|
|
Thread: Token length exception on valid MSOffice hash
Post: RE: Token length exception on valid MSOffice hash
What hashcat version are you using? Example hash loads fine for me in latest beta. However, mode 9400 is for office 2007. |
|
undeath |
hashcat
|
1 |
829 |
03-05-2020, 05:05 PM |
|
|
Thread: Whats the most efficient way to do this? (newbie)
Post: RE: Whats the most efficient way to do this? (newb...
No, you would need a hash mode with salt support for that. |
|
undeath |
hashcat
|
3 |
844 |
04-23-2020, 07:21 PM |
|
|
Thread: Using DD to get the hash of a non-system partition encrypted by VeraCrypt
Post: RE: Using DD to get the hash of a non-system parti...
if your dd in fact spits out ascii-hex it's probably broken |
|
undeath |
hashcat
|
3 |
863 |
03-29-2020, 04:27 PM |
|
|
Thread: Help to specify mask/charset/command
Post: RE: Help to specify mask/charset/command
No, it's because there are so many possibilities you will never see the attack complete in your lifetime no matter what hardware you have. |
|
undeath |
hashcat
|
3 |
870 |
04-12-2020, 06:47 PM |
|
|
Thread: hashcat problem with huge dictionary text files (bug)
Post: RE: hashcat problem with huge dictionary text file...
you are using -a3 (mask attack) with a dictionary
btw, pocl is not recommended, you should use the Intel OpenCL runtime |
|
undeath |
hashcat
|
3 |
880 |
03-30-2020, 12:05 AM |
|
|
Thread: hashcat problem with huge dictionary text files (bug)
Post: RE: hashcat problem with huge dictionary text file...
If you use a dictionary you should use a dictionary attack (a0). |
|
undeath |
hashcat
|
3 |
880 |
03-31-2020, 06:12 PM |
|
|
Thread: Is this good?
Post: RE: Is this good?
The usage of your GPU depends on the attack type and hash type you are using. Straight wordlist attacks have poor performance. Have a look at https://hashcat.net/wiki/doku.php?id=frequently_asked_ques... |
|
undeath |
hashcat
|
6 |
880 |
07-21-2020, 04:14 PM |
|
|
Thread: --markov-disable taking more time
Post: RE: --markov-disable taking more time
The faster hashes are cracked early on, the fewer hashes hashcat has to search through later. This of course has an impact on overall speed. If you want a fair comparison use a single hash that will n... |
|
undeath |
hashcat
|
3 |
890 |
04-20-2020, 12:36 PM |
|
|
Thread: Using a combo of masks and rules
Post: RE: Using a combo of masks and rules
That's pretty much how you have to do things with masks. Note that custom charsets support all the included charsets as well.
Instead of
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789... |
|
undeath |
hashcat
|
3 |
890 |
05-11-2020, 01:06 AM |
|
|
Thread: Output progress over time in hashcat
Post: RE: Output progress over time in hashcat
You can use --status and --status-timer to log hashcat's progress to stdout (and redirect to a file) and then analyse those logs. |
|
undeath |
hashcat
|
3 |
895 |
04-13-2020, 11:56 PM |