Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: [Help] Can someone teach me how to crack SMF (sha1($salt.$pass) ) pass with hashcat?
Post: CHEAP VIAGRA, BUY FACEBOOK STOCKS NOW
|
undeath |
Old hashcat Support
|
8 |
21,614 |
05-22-2012, 04:57 PM |
|
|
Thread: Hashcat 0.12 no responding
Post: RE: Hashcat 0.12 no responding
why are you using --force? what happens when you omit this? |
|
undeath |
Very old oclHashcat-plus Support
|
13 |
21,507 |
01-18-2013, 12:48 PM |
|
|
Thread: "brute force" and custom charset questions
Post: RE: "brute force" and custom charset questions
these are special characters interpreted by bash. You need to either (single) quote them or escape them. |
|
undeath |
Very old oclHashcat-plus Support
|
5 |
21,488 |
11-29-2012, 07:44 PM |
|
|
Thread: "brute force" and custom charset questions
Post: RE: "brute force" and custom charset questions
? is the special character for hashcat masks. you need to do ?? to have the character ? in the mask |
|
undeath |
Very old oclHashcat-plus Support
|
5 |
21,488 |
11-29-2012, 08:58 PM |
|
|
Thread: ERROR: cuModuleLoad() 301
Post: RE: ERROR: cuModuleLoad() 301
is your forceware driver properly installed? |
|
undeath |
Old oclHashcat Support
|
12 |
21,453 |
01-12-2015, 07:30 PM |
|
|
Thread: hashcat-utils are being detected as trojans!
Post: RE: hashcat-utils are being detected as trojans!
Actually the best action is to yell at your antivirus sw vendor. |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
9 |
21,323 |
03-30-2016, 12:14 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
Yes, you want to do a mask attack https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
hashcat
|
25 |
21,256 |
08-08-2017, 11:43 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
slayerdiangelo Wrote: (08-08-2017, 03:21 PM)
--
You should use the mask processor and pipe the output to Hashcat.
--
Hashcat supports mask attacks in attack mode 3. No need to use external tools.
... |
|
undeath |
hashcat
|
25 |
21,256 |
08-08-2017, 04:20 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
depends, if your wallet is mode 15600 [$ethereum$p] use your GPU (mining rig) if your wallet is mode 15700 [$ethereum$s] use your CPU (gaming machine) still use your mining rig
(well, actually it mig... |
|
undeath |
hashcat
|
25 |
21,256 |
08-08-2017, 06:42 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
use https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/ethereum2john.py to extract the necessary info from your wallet
you're on the right track. To set the hash type consult --h... |
|
undeath |
hashcat
|
25 |
21,256 |
08-09-2017, 12:00 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
4 H/s is really slow. Something seems off. As written before, my old 2600k manages to get 13 H/s. But why not using your GPU? It's probably still at least as fast as your CPU. Note that it may take ~2... |
|
undeath |
hashcat
|
25 |
21,256 |
08-09-2017, 10:18 AM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
Did you try --scrypt-tmto=0? At least the example hash works for me with every tmto setting (though 0 is the fastest option on cpu and gpu in my scenario).
--force is only if you use an unsupported... |
|
undeath |
hashcat
|
25 |
21,256 |
08-09-2017, 05:38 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
I just learnt script-tmto=0 means auto-configuration, not disable tmto trade-offs alltogether. And furthermore, the higher the value the less RAM is used.
However, there might be an incompatibility w... |
|
undeath |
hashcat
|
25 |
21,256 |
08-10-2017, 04:55 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
take home message: the scrypt settings ethereum uses by default make GPU cracking mostly impossible. Just use your CPU. |
|
undeath |
hashcat
|
25 |
21,256 |
08-10-2017, 05:35 PM |
|
|
Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password
scrypt has three parameters. Depending on how those parameters are chosen it may or may not work on GPU. The parameters of your ethereum wallet don't. |
|
undeath |
hashcat
|
25 |
21,256 |
08-11-2017, 10:12 AM |
|
|
Thread: Pipe is slow
Post: RE: Pipe is slow
why not let oclhashcat apply the rules and just cat the wordlist?
oclhashcat -r rules.file < wordlist |
|
undeath |
Old oclHashcat Support
|
14 |
21,245 |
03-14-2015, 11:51 PM |
|
|
Thread: OpenCl kernel self-test failed when using any version later than v4.2.1 !!
Post: RE: OpenCl kernel self-test failed when using any ...
Did you actually read the error message you posted? Your driver is probably broken. There may be driver bugs that are triggered only by some hashcat versions. |
|
undeath |
hashcat
|
29 |
21,222 |
01-30-2019, 01:23 PM |
|
|
Thread: Cracking salted md5
Post: RE: Cracking salted md5
format is hash:salt
how the salt looks like doesn't matter |
|
undeath |
Old oclHashcat Support
|
2 |
21,215 |
05-11-2014, 10:58 PM |
|
|
Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash
The wiki article you mention is about maskprocessor, not hashcat. If you use mp the candidates are generated on cpu.
Using hashcat's a3 mode is always better than using mp if you don't need any spe... |
|
undeath |
hashcat
|
8 |
21,164 |
09-02-2017, 08:59 PM |
|
|
Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash
Yes, if you pipe anything into hashcat (mp/pp/…) it's using your cpu.
In general mask attack will be the fastest mode but with sufficient rules the speed of a wordlist attack should be pretty clo... |
|
undeath |
hashcat
|
8 |
21,164 |
09-03-2017, 05:15 PM |