Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: can i know???
Post: RE: can i know???
2501 doesn't use normal word lists. That's the difference over 2500… |
|
undeath |
hashcat
|
8 |
6,372 |
08-18-2018, 09:58 AM |
|
|
Thread: can i know???
Post: RE: can i know???
you need to pre-generate a PMK list using https://github.com/ZerBea/hcxkeys |
|
undeath |
hashcat
|
8 |
6,372 |
08-18-2018, 10:19 AM |
|
|
Thread: WPA2 Bruteforce.
Post: RE: WPA2 Bruteforce.
If you need to match such password policies you will need to use PACK https://thesprawl.org/projects/pack/ |
|
undeath |
Old oclHashcat Support
|
2 |
6,382 |
07-17-2015, 03:01 PM |
|
|
Thread: bitcoin2hashcat error
Post: RE: bitcoin2hashcat error
Could be anything. The file may be damaged or maybe a slightly different format is used in newer versions of bitcoind. |
|
undeath |
hashcat
|
7 |
6,386 |
07-19-2018, 03:11 PM |
|
|
Thread: bitcoin2hashcat error
Post: RE: bitcoin2hashcat error
four different clients? This is only for the bitcoin core wallet. |
|
undeath |
hashcat
|
7 |
6,386 |
07-19-2018, 09:20 PM |
|
|
Thread: bitcoin2hashcat error
Post: RE: bitcoin2hashcat error
From what I can tell bitcoin2john.py should be compatible with hashcat. Can you try and confirm? |
|
undeath |
hashcat
|
7 |
6,386 |
07-22-2018, 10:05 PM |
|
|
Thread: Complex iTunes password
Post: RE: Complex iTunes password
The messages you are seeing are just some info, no warnings. Don't know about the ones you did not post.
If you're trying to brute-force that password you're not going to have any success. I don't ... |
|
undeath |
hashcat
|
7 |
6,395 |
09-05-2017, 04:32 PM |
|
|
Thread: Complex iTunes password
Post: RE: Complex iTunes password
Of course you can crack that with a wordlist or mask attack but you'd need to add so much specific info about the password it's almost like cheating. No real use. |
|
undeath |
hashcat
|
7 |
6,395 |
09-06-2017, 12:03 PM |
|
|
Thread: Hashcat piping doesn't work (WPA/2)
Post: RE: Hashcat piping doesn't work (WPA/2)
Are you able to crack the password using a different method than piping? mask attack, normal wordlist attack, … |
|
undeath |
User Contributions
|
4 |
6,411 |
05-11-2018, 11:28 AM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
your are doing something weird. Why are you using -a6 with a 7 char mask when you're trying to crack a LM hash? The plaintext cannot be longer than 7 chars. -a6 is only fast if your left side has enou... |
|
undeath |
hashcat
|
12 |
6,451 |
10-26-2018, 03:35 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
see my edit above, piping (as you were already doing) is the correct approach. |
|
undeath |
hashcat
|
12 |
6,451 |
10-26-2018, 03:58 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
it should have used all the possibilities. You can check that by examining the output of the first command on its own. |
|
undeath |
hashcat
|
12 |
6,451 |
10-27-2018, 10:44 AM |
|
|
Thread: [ask] cap to hccapx
Post: RE: [ask] cap to hccapx
I only know of C implementations |
|
undeath |
User Contributions
|
6 |
6,453 |
12-06-2017, 06:27 PM |
|
|
Thread: [ask] cap to hccapx
Post: RE: [ask] cap to hccapx
If you already have one for hccap it should be easy to adopt to hccapx. |
|
undeath |
User Contributions
|
6 |
6,453 |
12-06-2017, 07:43 PM |
|
|
Thread: Integer overflow detected in keyspace of mask
Post: RE: Integer overflow detected in keyspace of mask
the answer hasn't changed since last year. https://hashcat.net/forum/thread-7749-post-41663.html#pid41663 |
|
undeath |
General Talk
|
7 |
6,482 |
04-28-2019, 06:01 PM |
|
|
Thread: OpenCL problem
Post: RE: OpenCL problem
don't run hashcat in a VM |
|
undeath |
hashcat
|
5 |
6,486 |
11-06-2018, 10:39 AM |
|
|
Thread: Identifying Hash type
Post: RE: Identifying Hash type
what's the plain text of these hashes? |
|
undeath |
General Talk
|
3 |
6,488 |
07-13-2015, 01:09 AM |
|
|
Thread: oclHashcat-plus isn't cracking my NTLM hash
Post: RE: oclHashcat-plus isn't cracking my NTLM hash
hashcat does not check for the empty string. |
|
undeath |
Very old oclHashcat-plus Support
|
2 |
6,496 |
05-21-2012, 09:48 AM |
|
|
Thread: Hash type?
Post: RE: Hash type?
Looks like encrypted using an (wrongly implemented) OTP.
Code:
--
def group(e, n=2):
res = []
for x in range(len(e)//n):
res.append(e[x*n:(x+1)*n])
return res
def parseEnc(e):
return li... |
|
undeath |
General Help
|
5 |
6,508 |
07-03-2015, 05:55 PM |
|
|
Thread: PBKDF2-SHA512 separator unmatched
Post: RE: PBKDF2-SHA512 separator unmatched
what hashcat version are you using? The example hash works for me so you must be doing something wrong. |
|
undeath |
hashcat
|
8 |
6,526 |
06-12-2018, 02:26 PM |