Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Can this password type be brute forced?
Post: RE: Can this password type be brute forced?
Assuming a theoretical hash rate of 1 TH/s (which is already very fast, even for a fast hash mode) you'd be looking at about 10^43 years of cracking. Pretty sure that's well beyond the expected end of... |
|
undeath |
General Talk
|
2 |
1,226 |
01-10-2020, 01:08 PM |
|
|
Thread: Rule Question
Post: RE: Rule Question
hashcat will not run the unmodified word unless a rule in the rules file returns the unmodified word again. |
|
undeath |
hashcat
|
3 |
1,243 |
08-26-2019, 04:05 PM |
|
|
Thread: Devices being skipped
Post: RE: Devices being skipped
-D is for device types (2 in your case), -d is for individual devices. Try that instead. |
|
undeath |
hashcat
|
8 |
1,246 |
07-25-2020, 01:43 PM |
|
|
Thread: hashcat on raspberry pi 4
Post: RE: hashcat on raspberry pi 4
https://hashcat.net/forum/thread-2368.html?highlight=raspberry+pi |
|
undeath |
hashcat
|
3 |
1,256 |
04-01-2020, 01:45 AM |
|
|
Thread: I have error please help me
Post: RE: I have error please help me
what is not clear about the error? |
|
undeath |
hashcat
|
3 |
1,264 |
12-15-2019, 10:26 PM |
|
|
Thread: Plz help with iTunes encryption
Post: RE: Plz help with iTunes encryption
It's not clear what exactly your problem is. |
|
undeath |
hashcat
|
2 |
1,271 |
06-05-2019, 11:17 AM |
|
|
Thread: some info about rules
Post: RE: some info about rules
https://hashcat.net/wiki/doku.php?id=rule_based_attack |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
1,274 |
09-07-2019, 12:07 PM |
|
|
Thread: Blockchain Wallet
Post: RE: Blockchain Wallet
hashcat cannot be used to attack websites. |
|
undeath |
hashcat
|
6 |
1,277 |
06-19-2020, 01:57 AM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
-O is using a different kernel that has some optimizations and should run faster but only works for passwords up to a certain length (depending on the specific hashing function). This length is usuall... |
|
undeath |
hashcat
|
8 |
1,279 |
06-24-2020, 12:29 PM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
led5150 Wrote: (06-25-2020, 01:20 AM)
--
Funny enough, it does find it without the -O flag. Would it be safe/reliable to use without it?
--
Unfortunately that's not safe to say. Fact is, there is... |
|
undeath |
hashcat
|
8 |
1,279 |
06-26-2020, 03:17 PM |
|
|
Thread: new 5700xt fails to benchmark
Post: RE: new 5700xt fails to benchmark
try with the beta at https://hashcat.net/beta/ |
|
undeath |
hashcat
|
2 |
1,283 |
12-04-2019, 01:54 PM |
|
|
Thread: how to extract username:plain
Post: RE: how to extract username:plain
grep -v '^.*:[regex that matches hash]$' file |
|
undeath |
hashcat
|
1 |
1,288 |
05-12-2019, 10:54 PM |
|
|
Thread: Bruteforcing SHA1 with knowing the salt
Post: RE: Bruteforcing SHA1 with knowing the salt
see "hashcat --example -m 110" for the expected format or have a look at https://hashcat.net/wiki/doku.php?id=example_hashes |
|
undeath |
hashcat
|
5 |
1,289 |
04-15-2020, 05:46 PM |
|
|
Thread: Bruteforcing SHA1 with knowing the salt
Post: RE: Bruteforcing SHA1 with knowing the salt
Yes, that's correct. You should specify a mask when running -a3 btw. |
|
undeath |
hashcat
|
5 |
1,289 |
04-15-2020, 08:29 PM |
|
|
Thread: Nano Ledger S
Post: RE: Nano Ledger S
|
undeath |
General Talk
|
1 |
1,298 |
06-28-2019, 08:07 PM |
|
|
Thread: 10-Hex-Generator
Post: RE: 10-Hex-Generator
You cannot use restore with a pipe. Your candidate generator has to have some kind of resume support for that. |
|
undeath |
hashcat
|
2 |
1,301 |
02-17-2020, 11:53 PM |
|
|
Thread: Hybrid attack keyspace inconsistency
Post: RE: Hybrid attack keyspace inconsistency
The option name "keyspace" is misleading and isn't actually the keyspace. It's just some internal hashcat number.
Or to quote the FAQ entry you linked:
Quote:
--
hashcat's --keyspace is specifically... |
|
undeath |
hashcat
|
3 |
1,314 |
03-05-2020, 11:02 PM |
|
|
Thread: Some interesting test 14100
Post: RE: Some interesting test 14100
You cannot do something like k1=k3 with a mask. |
|
undeath |
hashcat
|
5 |
1,316 |
04-28-2020, 02:19 AM |
|
|
Thread: mask search with doubles
Post: RE: mask search with doubles
It's not possible with masks only. You can pipe in a mask attack and then apply the repeat rule "p" to each input word. However, depending on your hash type, this may severely slow down your attack sp... |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
1,317 |
10-21-2019, 11:49 AM |
|
|
Thread: how to do it better ???
Post: RE: how to do it better ???
You only need to fix that if you see the error. The message in itself is only a warning. I'm not sure what you mean by "restore the settings" but you can already do everything hashcat does without tha... |
|
undeath |
hashcat
|
4 |
1,321 |
01-30-2020, 12:07 AM |