Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Very low hashrate on two 770s
Post: RE: Very low hashrate on two 770s
Sounds about right, its pbkdf2-hmac-sha512. What let's you think it should be faster, or what did you expect? |
|
atom |
Old oclHashcat Support
|
4 |
6,675 |
05-19-2016, 08:22 PM |
|
|
Thread: Need Help to find out hash type
Post: RE: Need Help to find out hash type
Could be anything. As I've said, you need to reverse the algorithm or look into the source. |
|
atom |
General Help
|
6 |
7,713 |
05-19-2016, 08:18 PM |
|
|
Thread: Times of cracking single hashes
Post: RE: Times of cracking single hashes
No, but you can write your own script to do it |
|
atom |
Old oclHashcat Support
|
1 |
3,740 |
05-19-2016, 08:16 PM |
|
|
Thread: Help with MSKerb5 Hash
Post: RE: Help with MSKerb5 Hash
looks invalid, please see example hash page on the wiki |
|
atom |
General Help
|
2 |
5,732 |
05-19-2016, 08:15 PM |
|
|
Thread: ASP.NET Membership Password Hash
Post: RE: ASP.NET Membership Password Hash
No, we don't try it. There are better ways to handle large salts, as described on the wiki I linked |
|
atom |
Old hashcat Support
|
3 |
7,366 |
05-19-2016, 08:15 PM |
|
|
Thread: hashcat-3.00 beta syntax
Post: RE: hashcat-3.00 beta syntax
It uses both, just choose a larger wordlist |
|
atom |
Old hashcat Support
|
2 |
6,034 |
05-19-2016, 08:13 PM |
|
|
Thread: about using old version
Post: RE: about using old version
Just don't use old versions |
|
atom |
Old oclHashcat Support
|
4 |
6,418 |
05-16-2016, 01:46 PM |
|
|
Thread: ASP.NET Membership Password Hash
Post: RE: ASP.NET Membership Password Hash
There's just this: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_the_maximum_supported_salt_length |
|
atom |
Old hashcat Support
|
3 |
7,366 |
05-16-2016, 01:46 PM |
|
|
Thread: Need Help to find out hash type
Post: RE: Need Help to find out hash type
You need the source to find about the algorithm used. |
|
atom |
General Help
|
6 |
7,713 |
05-16-2016, 01:45 PM |
|
|
Thread: WPA/WPA2 dictionary attack doesn't work!
Post: RE: WPA/WPA2 dictionary attack doesn't work!
Try wpaclean (it's in aircrack-ng) before creating the hccap. Or if you used wpaclean already, try creating the hccap without using wpaclean before. |
|
atom |
Old oclHashcat Support
|
2 |
4,958 |
05-16-2016, 01:40 PM |
|
|
Thread: NetgearKiller.dict - my Netgear WPA dict
Post: RE: NetgearKiller.dict - my Netgear WPA dict
The wordlist works only for default password. If the password was changed, it will not work. |
|
atom |
User Contributions
|
15 |
82,305 |
05-16-2016, 01:38 PM |
|
|
Thread: Hashcat duplicates
Post: RE: Hashcat duplicates
epixoip Wrote: (05-12-2016, 07:34 PM)
--
Use --show afterwards.
--
That and, don't use --remove |
|
atom |
Old oclHashcat Support
|
4 |
8,532 |
05-13-2016, 03:35 PM |
|
|
Thread: GPU #2 shuts down. Temperature control?
Post: RE: GPU #2 shuts down. Temperature control?
No, but maybe not enough workload. You should get a warning like this:
Quote:
--
ATTENTION!
The wordlist or mask you are using is too small.
Therefore, hashcat is unable to utilize the ful... |
|
atom |
Old oclHashcat Support
|
1 |
3,133 |
05-13-2016, 03:34 PM |
|
|
Thread: Can't crack multiple hashes, only single
Post: RE: Can't crack multiple hashes, only single
Wouldn't call it a bug, as it was always clear maximum supported salt length is 31. With hashcat v3.00 beta we just increased that length a bit. However, with those hashes with salt length 40, your ma... |
|
atom |
hashcat
|
7 |
13,889 |
05-13-2016, 03:17 PM |
|
|
Thread: NetNTLMv2 Cyrillic symbols issue
Post: RE: NetNTLMv2 Cyrillic symbols issue
The linked site from rura works for the most algorithm like MD5, WPA, etc, but you can't crack 8bit passwords on algorithms which do the unicode conversion inside the algorithm itself. In that case th... |
|
atom |
Old hashcat Support
|
4 |
7,564 |
05-13-2016, 03:09 PM |
|
|
Thread: Behind the WinZip KDF optimization
Post: Behind the WinZip KDF optimization
With the latest beta-version of hashcat I've added support to crack WinZip encrypted (password protected) archives.
While I was implementing the kernel it turned out that their use of PBKDF2 (aka... |
|
atom |
User Contributions
|
1 |
13,478 |
05-13-2016, 01:32 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
The optimal maskfile, according to the policy you've posted, would be:
Quote:
--
?u?l?l?l
?l?u?l?l
?l?l?u?l
?l?l?l?u
--
You can generate them with PACK 0.4 |
|
atom |
User Contributions
|
47 |
208,555 |
05-04-2016, 12:31 PM |
|
|
Thread: cudahascat bug?
Post: RE: cudahascat bug?
Already fixed in latest beta, thanks! |
|
atom |
Old oclHashcat Support
|
3 |
4,886 |
05-03-2016, 05:50 PM |
|
|
Thread: bypass hashcat
Post: RE: bypass hashcat
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#why_should_i_use_a_mask_attack_i_just_want_to_brute_these_hashes |
|
atom |
Old hashcat Support
|
4 |
11,462 |
05-01-2016, 09:02 PM |
|
|
Thread: Do I need to do pipes for my GPU cracking?
Post: RE: Do I need to do pipes for my GPU cracking?
|
atom |
hashcat
|
1 |
3,714 |
05-01-2016, 09:00 PM |