Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Errors on Win7 and Linux
Post: RE: Errors on Win7 and Linux
If you want to use linux, use ubuntu |
|
atom |
hashcat
|
5 |
6,883 |
05-26-2017, 10:07 AM |
|
|
Thread: Cracking wpa2 with foreign characters.
Post: RE: Cracking wpa2 with foreign characters.
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_to_deal_with_special_non-latin_characters_chinese_arabic_etc |
|
atom |
hashcat
|
2 |
4,269 |
05-26-2017, 10:22 AM |
|
|
Thread: need help with markov chain, or possibly another solution for decrypt of AES-256
Post: RE: need help with markov chain, or possibly anoth...
If the keyspace is just 2^32 it would be easy to crack the key if you know the plaintext. The keyspace is so small, you wouldn't even need to do it on GPU, you can do it on CPU. |
|
atom |
hashcat
|
13 |
11,856 |
05-27-2017, 01:04 PM |
|
|
Thread: Slow/no status response in Windows 10
Post: RE: Slow/no status response in Windows 10
I think there's those 2 answers to your 2 questions:
a) the status is blocked by a possible large number of cracked hashes you do. that will fix "itself" after a while, that is when you do no longer ... |
|
atom |
hashcat
|
13 |
11,068 |
06-02-2017, 11:06 AM |
|
|
Thread: Basic hashcat mask syntax
Post: RE: Basic hashcat mask syntax
The mask you specify is not ?1?1?1?1?1?1?1?1 as you could think, it's just "?1". That's because of the --increment option. If you remove it the warning will be be gone. |
|
atom |
hashcat
|
4 |
6,438 |
06-02-2017, 02:00 PM |
|
|
Thread: Basic hashcat mask syntax
Post: RE: Basic hashcat mask syntax
Protip: use CPU only (-D 1) for such small masks |
|
atom |
hashcat
|
4 |
6,438 |
06-02-2017, 04:12 PM |
|
|
Thread: truecrypt with unknown algorithm
Post: RE: truecrypt with unknown algorithm
Wait, that's not useful. If you do for example 6213, there's no need to do 6211, otherwise the entire system would make no sense. |
|
atom |
hashcat
|
2 |
3,237 |
06-07-2017, 11:21 AM |
|
|
Thread: Need help ETHEREUM hashtype 15700
Post: RE: Need help ETHEREUM hashtype 15700
Try again with --scrypt-tmto 2. If it works, it's a driver error. Note that it can take some time to start. Also try -D 1 separately. |
|
atom |
hashcat
|
11 |
12,241 |
06-09-2017, 09:25 AM |
|
|
Thread: Need help ETHEREUM hashtype 15700
Post: RE: Need help ETHEREUM hashtype 15700
The pc does not freeze, it just looks like that. That is because the GPU is so busy with this algorithm it has no clocks left to update the screen for the monitor. The solution is to run hashcat on li... |
|
atom |
hashcat
|
11 |
12,241 |
06-09-2017, 08:07 PM |
|
|
Thread: benchmarking and retain
Post: RE: benchmarking and retain
The kernel runtime (miliseconds) is too short to produce any heat on the GPU |
|
atom |
hashcat
|
3 |
3,392 |
06-13-2017, 08:38 AM |
|
|
Thread: hashcat v3.6.0
Post: hashcat v3.6.0
[hr]
Welcome to hashcat v3.6.0 release! This release is mostly about new algorithms added.
Thanks to everyone who contributed to this release!!!
[hr]
Download here: https://hashcat.net/has... |
|
atom |
hashcat
|
6 |
26,344 |
06-09-2017, 05:51 PM |
|
|
Thread: Cracked hashes not going to outfile?
Post: RE: Cracked hashes not going to outfile?
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword |
|
atom |
hashcat
|
3 |
3,830 |
06-13-2017, 08:38 AM |
|
|
Thread: Understanding integer overflow
Post: RE: Understanding integer overflow
No, hashcat is checking the overflow for every length, not just the minimum one. But it's checking the overflow whenever a new attack starts internally. If you use increment, each password length unfo... |
|
atom |
hashcat
|
1 |
2,365 |
06-13-2017, 08:45 AM |
|
|
Thread: is hashcat support an ordinary exe\cmd file?
Post: RE: is hashcat support an ordinary exe\cmd file?
|
atom |
hashcat
|
1 |
2,304 |
06-20-2017, 09:58 AM |
|
|
Thread: Ethereum wallet length exception
Post: RE: Ethereum wallet length exception
Did you remove the "username" part? That is the stuff before and including the : char.
See https://hashcat.net/wiki/doku.php?id=example_hashes for an example hash |
|
atom |
hashcat
|
6 |
7,386 |
06-20-2017, 10:00 AM |
|
|
Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...
Your ethereum wallet uses scrypt, which means it's using an anti-gpu algorithm. Therefore you don't get much of acceleration by using a GPU to crack it unless you have many powerful GPUs like the GTX1... |
|
atom |
hashcat
|
21 |
25,961 |
06-20-2017, 10:11 AM |
|
|
Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?
Wait, 62^12 = 0xE5720EE830681000 so it's close to an integer overflow but it's not overflowing. Therefore hashcat is not warning.
Cracking a random WPA password with length 12 with upper, lower and... |
|
atom |
hashcat
|
13 |
12,981 |
06-20-2017, 10:25 AM |
|
|
Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?
You're right! But hashcat is reporting the overflow correctly:
Integer overflow detected in keyspace of mask: ?1?1?1?1?1?1?1?1?1?1?1?1
(where -1 = ?d?l?u) |
|
atom |
hashcat
|
13 |
12,981 |
06-20-2017, 08:16 PM |
|
|
Thread: crunch hashcat piping WPA cracking not working
Post: RE: crunch hashcat piping WPA cracking not working
Copying means hashcat is waiting for input. It's not getting any data from crunch, which seems to be the problemn here. Try without the hashcat command and see if crunch produces any candidates. |
|
atom |
hashcat
|
4 |
9,123 |
06-23-2017, 03:18 PM |
|
|
Thread: Candidate definition
Post: RE: Candidate definition
The word "candidates" are the passwords that are used as input the for the select hash-mode. |
|
atom |
hashcat
|
9 |
13,199 |
06-23-2017, 03:20 PM |