Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: segfault on --stdout
Post: RE: segfault on --stdout
Your syntax is correct. The only thing I can imagine is some incompatibility with debian testing and the binary build of hashcat. You can try compiling hashcat yourself or see if stdout works correctl... |
|
undeath |
hashcat
|
4 |
3,011 |
10-01-2018, 11:56 AM |
|
|
Thread: Buying a new machine for Hashcat
Post: RE: Buying a new machine for Hashcat
Unless you need the CPU for other related means, eg wordlist processing, or you anticipate you need to crack GPU-hard algorithms like scrypt you don't need a fast CPU. If you can get it really cheap i... |
|
undeath |
Hardware
|
3 |
3,009 |
04-08-2018, 03:45 PM |
|
|
Thread: Freeze / no response when trying to see status or output, most of the time
Post: RE: Freeze / no response when trying to see status...
sounds like an ASIC hang, are you overclocking?
also see this thread: https://hashcat.net/forum/thread-6202.html |
|
undeath |
hashcat
|
5 |
3,008 |
09-25-2018, 09:57 PM |
|
|
Thread: To crack passwords with Russian symbols
Post: RE: To crack passwords with Russian symbols
This is a limitation of hashcat's UTF16-based kernels. See https://github.com/hashcat/hashcat/issues/2121
In the case of NTLM you can work around it by using the MD4 kernel with forced UTF-16LE encod... |
|
undeath |
hashcat
|
8 |
3,006 |
11-27-2019, 01:29 PM |
|
|
Thread: To crack passwords with Russian symbols
Post: RE: To crack passwords with Russian symbols
You need to use the MD4 (900) hash mode, not NTLM (1000) in that case. And you probably need to specify the --encoding-from option. |
|
undeath |
hashcat
|
8 |
3,006 |
11-27-2019, 03:42 PM |
|
|
Thread: To crack passwords with Russian symbols
Post: RE: To crack passwords with Russian symbols
your command should probably look like this:
hashcat -a 3 -m 900 e:\testvmhash.txt -1 charsets/standard/Russian/ru_cp1251.hcchr ?d?1 --encoding-to=utf16le --encoding-from=cp1251
If that doesn't work... |
|
undeath |
hashcat
|
8 |
3,006 |
11-27-2019, 04:34 PM |
|
|
Thread: To crack passwords with Russian symbols
Post: RE: To crack passwords with Russian symbols
Thanks for the correction, philsmd!
In that case it's probably easiest to use stdin for the attack, like this:
Code:
--
hashcat --stdout -a3 -1 charsets/standard/Russian/ru_cp1251.hcchr '?1?d'|... |
|
undeath |
hashcat
|
8 |
3,006 |
11-27-2019, 06:48 PM |
|
|
Thread: Telegram and hashcat.
Post: RE: Telegram and hashcat.
looks exactly like the format hashcat expects. |
|
undeath |
hashcat
|
9 |
2,995 |
01-20-2020, 07:07 PM |
|
|
Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes
What is "rfc2898DeriveBytes" supposed to be? RFC2898 (https://tools.ietf.org/html/rfc2898) specifies mulitple KDFs, one of them being the supported PBKDF2 algorithm.
But anyway, all the algorithms ... |
|
undeath |
hashcat
|
4 |
2,994 |
10-01-2018, 11:51 AM |
|
|
Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes
check out https://hashcat.net/wiki/doku.php?id=example_hashes
modes 10900 11900 12000 12100 |
|
undeath |
hashcat
|
4 |
2,994 |
10-01-2018, 01:38 PM |
|
|
Thread: Where's potfile?
Post: RE: Where's potfile?
Does that directory exist? The potfile is only created after at least one hash has been cracked successfully. |
|
undeath |
hashcat
|
7 |
2,992 |
04-10-2019, 11:48 PM |
|
|
Thread: Blockchain second passwords
Post: RE: Blockchain second passwords
You can view supported hash formats in the --help output or here (https://hashcat.net/wiki/doku.php?id=example_hashes) |
|
undeath |
hashcat
|
3 |
2,983 |
08-09-2018, 09:58 AM |
|
|
Thread: Time.Estimated, does this estimate look accurate ?
Post: RE: Time.Estimated, does this estimate look accur...
There might be some overflow happening. 3y is definitely off.
(26+10)**10 / 2800 / 60 / 60 / 24 / 365 = 41405.7227121722 (years)
even with a high end rig this kind of keyspace is not realistic. |
|
undeath |
hashcat
|
2 |
2,970 |
05-06-2017, 07:03 PM |
|
|
Thread: Bitcoin HASH
Post: RE: Bitcoin HASH
It attacks the wallet passphrase, not the seed extension. |
|
undeath |
General Talk
|
2 |
2,967 |
11-02-2017, 11:45 PM |
|
|
Thread: MD5 mask for password
Post: RE: MD5 mask for password
pbies Wrote: (06-27-2018, 05:31 PM)
--
Is it possible to bypass such computation?
--
you can modify the source code
pbies Wrote: (06-27-2018, 05:31 PM)
--
For a good desktop PC is it possible to ... |
|
undeath |
hashcat
|
3 |
2,962 |
06-27-2018, 05:39 PM |
|
|
Thread: Cannot load module ./modules/module_02000.dll
Post: RE: Cannot load module ./modules/module_02000.dll
The module should be in the OpenCL folder. Is it there? |
|
undeath |
hashcat
|
6 |
2,951 |
07-06-2019, 11:00 AM |
|
|
Thread: Masks for Multiple Language Charsets in UTF-8
Post: RE: Masks for Multiple Language Charsets in UTF-8
Your findings are correct. UTF-8 is fully ASCII-compatible and latin characters (along with numbers and the basic set of special characters) are represented with only one byte.
As you already noticed... |
|
undeath |
hashcat
|
3 |
2,950 |
07-11-2018, 05:46 PM |
|
|
Thread: Rules rules rules!
Post: RE: Rules rules rules!
for a start, here is the article about rules: https://hashcat.net/wiki/doku.php?id=rule_based_attack
The rules you need to accomplish what you are looking for arethe insert rule (i)
the prepend rule... |
|
undeath |
hashcat
|
3 |
2,929 |
02-10-2018, 02:52 PM |
|
|
Thread: Rules rules rules!
Post: RE: Rules rules rules!
Well, that will mostly depend on the size of your wordlist. Assuming passwords of up to 10 characters (before rules), you have
[positions of LAD]*[positions of BYE]*[possibilities for m@1d]*[positi... |
|
undeath |
hashcat
|
3 |
2,929 |
02-10-2018, 07:10 PM |
|
|
Thread: Syntax help
Post: RE: Syntax help
https://hashcat.net/wiki/doku.php?id=mask_attack |
|
undeath |
General Talk
|
2 |
2,925 |
06-29-2017, 10:12 AM |