Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Salt input and bruteforcing
Post: RE: Salt input and bruteforcing
is the "number(1 to 9).1234567890876543" part fixed? If so you should add it to the salt. You don't need to define ?1 for a single character. You can simply use that character in the mask. |
|
undeath |
hashcat
|
3 |
2,136 |
11-09-2018, 12:17 PM |
|
|
Thread: Performance Stats
Post: RE: Performance Stats
If you care only for a single hash/list of hashes you can quickly write a wrapper script. Otherwise, no, not possible. |
|
undeath |
hashcat
|
1 |
2,133 |
08-07-2017, 03:35 PM |
|
|
Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix
if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4 |
|
undeath |
General Talk
|
2 |
2,127 |
09-27-2018, 04:14 PM |
|
|
Thread: How to configure a thin brute force in hashcat?
Post: RE: How to configure a thin brute force in hashcat...
|
undeath |
hashcat
|
2 |
2,124 |
12-08-2018, 11:50 PM |
|
|
Thread: hashcat64 4.2.1 getting killed OOM
Post: RE: hashcat64 4.2.1 getting killed OOM
Ideally you have as much RAM as you have VRAM. The lower limit for available system RAM hashcat requires was set to 2GB per opencl device if I remember correctly. (thus, running with only three device... |
|
undeath |
hashcat
|
2 |
2,121 |
09-17-2018, 10:46 PM |
|
|
Thread: Excel 2016 Workbook Hash
Post: RE: Excel 2016 Workbook Hash
hashcat can only crack passwords of encrypted office documents, not protected ones. |
|
undeath |
hashcat
|
2 |
2,112 |
05-27-2019, 07:23 PM |
|
|
Thread: Custom Hash Algorithm / Modify or Add new mode
Post: RE: Custom Hash Algorithm / Modify or Add new mode
No, those were manually re-hashed. |
|
undeath |
hashcat
|
3 |
2,091 |
08-22-2019, 04:13 PM |
|
|
Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...
32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7).
All other security properties are trivially fulfilled under... |
|
undeath |
hashcat
|
2 |
2,089 |
11-20-2018, 01:48 AM |
|
|
Thread: same attack, no results
Post: RE: same attack, no results
If you want to resume an attack you should use the session restore feature or the brain server. |
|
undeath |
hashcat
|
3 |
2,087 |
04-23-2019, 09:59 PM |
|
|
Thread: adding additional GPU to Brutalis | Hashstack
Post: RE: adding additional GPU to Brutalis | Hashstack
afaik you get an unrestricted usage license as long as you're a Sagitta HPC customer. But it's certainly something you should ask their sales department about directly. |
|
undeath |
Hardware
|
2 |
2,078 |
04-24-2019, 05:32 PM |
|
|
Thread: GPU not utilised
Post: RE: GPU not utilised
srin2godisgreat Wrote: (10-07-2019, 08:40 PM)
--
From the output of the task manager and the status output of hashcat, it looks like only the cpu is being used.
--
I have no idea how you come to th... |
|
undeath |
hashcat
|
4 |
2,076 |
10-08-2019, 03:46 PM |
|
|
Thread: Recommendation for building a Hash Cracking Rig in 2020?
Post: RE: Recommendation for building a Hash Cracking Ri...
Since the 2000 series FE cards are no longer recommended because they don't have a blower fan any longer and thus are not suitable for stacking multiple cards in one case.
For RAM the rule of thumb... |
|
undeath |
Hardware
|
4 |
2,074 |
07-08-2020, 08:49 PM |
|
|
Thread: Decoding multiple PMKID SSIDs
Post: RE: Decoding multiple PMKID SSIDs
wlanhcxinfo of https://github.com/ZerBea/hcxtools should be able to do all you need. |
|
undeath |
General Talk
|
4 |
2,073 |
10-13-2019, 12:07 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-07-2020, 01:21 AM)
--
It would essentially be a brute force attack but with pre-generated passwords that one would use in a dict attack I guess.
--
I'm not sure what brou... |
|
undeath |
General Talk
|
10 |
2,064 |
07-07-2020, 10:02 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
CracktainCrunch Wrote: (07-06-2020, 12:00 PM)
--
Like taking already cracked passwords that were randomly generated and jumble them up or something like that?
--
That's what rule-based attacks do (... |
|
undeath |
General Talk
|
10 |
2,064 |
07-06-2020, 03:25 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file.
CracktainCrunch Wrote: (07-07-2020, 08:24 PM)
--
I u... |
|
undeath |
General Talk
|
10 |
2,064 |
07-08-2020, 08:29 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
You can use princeprocessor for this. It can handle everything but the space between the words. Toggling the case of the first character can be done with a hashcat rule. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:36 PM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
Yes, you could simply append a space to every word in your wordlist for that case. Just remember to add a rule in hashcat that deletes the trailing space of the last word. |
|
undeath |
hashcat
|
6 |
2,052 |
08-30-2019, 09:43 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind should be able to handle this |
|
undeath |
hashcat
|
6 |
2,051 |
10-31-2019, 12:08 PM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
this attack works:
Code:
--
hashcat -m10 $(python -c 'print("da8e187436ef310167021504d28c9b68"+":"+"00"*255)') -a3 '?b' --hex-salt
--
although hashcat's mask parser should probably be patched to all... |
|
undeath |
hashcat
|
6 |
2,043 |
10-09-2019, 06:06 PM |