Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
no, it doesn't. there are no instances of .?1 or .?2
and a "normal" IPv4 representation does not have leading zeros
I generated that hcmask file :P |
|
undeath |
hashcat
|
13 |
9,515 |
02-27-2018, 06:29 PM |
|
|
Thread: How i arrange pass for BF?
Post: RE: How i arrange pass for BF?
|
undeath |
Old oclHashcat Support
|
5 |
9,523 |
06-17-2014, 08:24 PM |
|
|
Thread: How i arrange pass for BF?
Post: RE: How i arrange pass for BF?
not even the NSA has enough resources to run this bf, so good luck... yes, it will bf from 8 to 16 chars. However your PC will break before you reach 16 chars. |
|
undeath |
Old oclHashcat Support
|
5 |
9,523 |
06-18-2014, 10:57 PM |
|
|
Thread: proper format: to use salt file
Post: RE: proper format: to use salt file
what error are you getting? |
|
undeath |
Old hashcat Support
|
6 |
9,562 |
04-29-2014, 11:15 PM |
|
|
Thread: Read MAC From .hccap
Post: RE: Read MAC From .hccap
https://hashcat.net/wiki/hccap |
|
undeath |
General Help
|
4 |
9,568 |
06-02-2012, 04:58 PM |
|
|
Thread: custom-charset goal ?
Post: RE: custom-charset goal ?
if you do not specify a mask, the default one is used. |
|
undeath |
Very old oclHashcat-lite Support
|
5 |
9,580 |
05-29-2012, 09:48 PM |
|
|
Thread: Why does emulating hybrid attack with rules skip some rules/ignore numbers?
Post: RE: Why does emulating hybrid attack with rules sk...
can confirm
Code:
--
./hashcat-cli64.bin /tmp/t -r /tmp/test -a1 /tmp/t --stdout | wc -l
500
--
a0 works
Code:
--
./hashcat-cli64.bin /tmp/t -r /tmp/test --stdout | wc -l
1000
--
|
|
undeath |
General Help
|
6 |
9,599 |
08-08-2015, 11:00 PM |
|
|
Thread: Two Question about bruteforce password vbb
Post: RE: Two Question about bruteforce password vbb
1. because you are an incompetent scripting kiddy.
2. the mask has to be at least the length to be bruteforced at maximum, say 10 times ?l for a 10 char password |
|
undeath |
Old hashcat Support
|
4 |
9,607 |
08-20-2012, 07:26 PM |
|
|
Thread: Dilemma…!
Post: RE: Dilemma…!
read this thread https://hashcat.net/forum/thread-6839.html |
|
undeath |
hashcat
|
13 |
9,650 |
09-12-2017, 09:15 PM |
|
|
Thread: Dilemma…!
Post: RE: Dilemma…!
Come up with different solutions if they're attacking fast hash modes. PACK for example can do the same thing by generating hcmask files. |
|
undeath |
hashcat
|
13 |
9,650 |
09-13-2017, 03:00 PM |
|
|
Thread: Dilemma…!
Post: RE: Dilemma…!
PACK is just a collection of python scripts. You can run python on almost any OS, including Windows. |
|
undeath |
hashcat
|
13 |
9,650 |
09-13-2017, 05:37 PM |
|
|
Thread: How to change password length (min/max)
Post: RE: How to change password length (min/max)
The min 0, max 256 is just technical information and not directly related to the actual password candidates processed.
Regarding the creation of masks see the wiki article: https://hashcat.net/wiki... |
|
undeath |
hashcat
|
4 |
9,653 |
02-06-2018, 01:44 PM |
|
|
Thread: Need help with rule based attack
Post: RE: Need help with rule based attack
just add -g 1000000 to your command line. |
|
undeath |
General Help
|
4 |
9,668 |
12-18-2012, 03:37 PM |
|
|
Thread: WPA restarting ten digit bruteforce
Post: RE: WPA restarting ten digit bruteforce
oclhashcat-plus does not have any option to resume. |
|
undeath |
General Talk
|
3 |
9,677 |
07-26-2012, 07:31 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
yes, performance is better with m20 if you have a static prefix.
hash format is usually
Code:
--
hexhash:salt
--
|
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:26 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
how did you create the hash? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 12:05 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command? |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 01:06 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4
Other than that the most time you can save by running clever attacks. |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 05:59 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
targeted wordlists, targeted rules, more narrow masks, … |
|
undeath |
hashcat
|
16 |
9,677 |
04-25-2018, 11:24 PM |
|
|
Thread: gpu temperature reached
Post: RE: gpu temperature reached
|
undeath |
Old oclHashcat Support
|
5 |
9,683 |
07-10-2014, 08:34 PM |