Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Can't reverse known hash ?
Post: RE: Can't reverse known hash ?
It will use the default mask. |
|
undeath |
Old oclHashcat Support
|
15 |
18,779 |
08-13-2015, 03:29 PM |
|
|
Thread: [Bug 0.14] Wrong hash target [Visual Bug]
Post: RE: [Bug? 0.14] Wrong hash target
can reproduce
Code:
--
../oclHashcat-lite-0.14/oclHashcat-lite64.bin deadbeefdeadbeefdeadbeefdeadbeefdeadbeef:abcdef -m110 "?d?d?d?d?d?d?d?a?d?a?d?d" --pw-min=10 --pw-max=12 --hex-salt
oclHashcat-li... |
|
undeath |
Very old oclHashcat-lite Support
|
10 |
18,755 |
02-05-2013, 11:46 AM |
|
|
Thread: [Bug 0.14] Wrong hash target [Visual Bug]
Post: RE: [Bug? 0.14] Wrong hash target
this is not related to this bug and should therefore be in a new thread. Also hashcat works heavily multithreaded, unless you run on cpu with -n1 it will always "mix" the results. |
|
undeath |
Very old oclHashcat-lite Support
|
10 |
18,755 |
02-05-2013, 06:10 PM |
|
|
Thread: [Bug 0.14] Wrong hash target [Visual Bug]
Post: RE: [Bug? 0.14] Wrong hash target
what i said applies to every version of oclhashcat-* too. |
|
undeath |
Very old oclHashcat-lite Support
|
10 |
18,755 |
02-05-2013, 06:55 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
https://hashcat.net/forum/thread-7686.html?highlight=stdin |
|
undeath |
hashcat
|
12 |
18,677 |
11-21-2018, 11:43 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
brute-forcing bcrypt is not feasible. |
|
undeath |
hashcat
|
12 |
18,677 |
11-22-2018, 05:36 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible. |
|
undeath |
hashcat
|
12 |
18,677 |
11-22-2018, 06:14 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
Mem5 Wrote: (11-23-2018, 12:14 AM)
--
Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds.
--
With cost factor 12? I think you're being a little too optimistic :D |
|
undeath |
hashcat
|
12 |
18,677 |
11-23-2018, 04:50 PM |
|
|
Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt
The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel. |
|
undeath |
hashcat
|
12 |
18,677 |
11-28-2018, 02:41 PM |
|
|
Thread: salted md5
Post: RE: salted md5
get some cmd crash course. You must not include the leading path. Also your mask is now totally fucked. |
|
undeath |
Old hashcat Support
|
9 |
18,644 |
11-03-2012, 12:01 PM |
|
|
Thread: salted md5
Post: RE: salted md5
you are using the wrong hash mode. Have a look at --help
With issuing the previous command you deleted oclhashcat-lite64.exe (it is a 0 bytes file now). Redownload/extract the exe again. |
|
undeath |
Old hashcat Support
|
9 |
18,644 |
11-03-2012, 12:45 PM |
|
|
Thread: [HowTo] Depot oclHashcat-plus's hashcat.pot perfectly
Post: RE: [HowTo] Depot oclHashcat-plus's hashcat.pot pe...
because the salt might include colons as well. |
|
undeath |
General Talk
|
6 |
18,483 |
07-31-2012, 01:11 PM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
Why are you using --force? Try with -w4 |
|
undeath |
hashcat
|
13 |
18,419 |
02-02-2018, 04:36 PM |
|
|
Thread: It never stops running
Post: RE: It never stops running
you can see the progress when hitting "s" |
|
undeath |
Very old oclHashcat-plus Support
|
13 |
18,333 |
01-29-2013, 02:34 AM |
|
|
Thread: Help with wordlists - cracking md5(unix)
Post: RE: Help with wordlists - cracking md5(unix)
unix-md5 is a slow algorithm and perfect for a gpu. |
|
undeath |
Old oclHashcat Support
|
8 |
18,215 |
02-06-2014, 02:48 PM |
|
|
Thread: old version hashcat
Post: RE: old version hashcat
if you can't install/run 14.9 you can't run oclhashcat. |
|
undeath |
Old hashcat Support
|
11 |
18,195 |
12-26-2014, 09:43 PM |
|
|
Thread: oclHashcat Help Plz
Post: RE: oclHashcat Help Plz
tl;dr
posting your hashes is forbidden |
|
undeath |
Old oclHashcat Support
|
8 |
18,134 |
06-12-2014, 08:49 PM |
|
|
Thread: ASIC support?
Post: RE: ASIC support?
just off the top of my head hashcat doesn't support any of these implementations. |
|
undeath |
Very old oclHashcat-lite Support
|
6 |
18,113 |
07-24-2013, 09:15 AM |
|
|
Thread: Custom password separator in md5($salt.$pass)
Post: RE: Custom password separator in md5($salt.$pass)
This is because atom creates custom optimized modules per hash type. If anyone requests md5($salt.$pass) with a 9 char salt (your 8 random chars + "/"), your hashes will be as weak as any other salted... |
|
undeath |
Very old oclHashcat-plus Support
|
7 |
18,059 |
04-11-2012, 12:24 AM |
|
|
Thread: Custom password separator in md5($salt.$pass)
Post: RE: Custom password separator in md5($salt.$pass)
As you already realized, cracking this is no problem at all. I think "security through obfuscation" applies here. Never do this, when there is a better way of solving your problem!
The reason for c... |
|
undeath |
Very old oclHashcat-plus Support
|
7 |
18,059 |
04-11-2012, 01:04 AM |