Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: [Bug] Hashcat v0.41 & oclHashcat v0.09 crash
Post: RE: [Bug] Hashcat v0.41 & oclHashcat v0.09 crash
Thanks undeath for testing |
|
atom |
General Talk
|
2 |
7,418 |
12-09-2012, 11:35 AM |
|
|
Thread: no faster WPA2 cracking?
Post: RE: no faster WPA2 cracking?
The discovery I made let you exploit any SHA1 based hashtype. That means it does not matter if its salted, HMAC or iterated.
But, and this is what Solar Designer is refering to, in case of an iterat... |
|
atom |
General Talk
|
7 |
16,161 |
12-15-2012, 06:10 PM |
|
|
Thread: password problem help please
Post: RE: password problem help please
There is no out of the box solution for that but should be simple to script. What you are searching for is a permutation function to try all combinations of the 5 blocks. Please take a look at Phillip... |
|
atom |
General Talk
|
4 |
9,851 |
01-02-2013, 12:25 PM |
|
|
Thread: no faster WPA2 cracking?
Post: RE: no faster WPA2 cracking?
It does not work for WPA. And as I said in the presentation I discovered this in early 2011. All oclHashcat versions already use it in these hashmodes that are compatible. |
|
atom |
General Talk
|
7 |
16,161 |
01-06-2013, 03:52 PM |
|
|
Thread: fgets-sse2 v0.01 released
Post: fgets-sse2 v0.01 released
Hey Guys,
fast loading a dictionary is an important part in a password cracker and the use of fgets(3) is not perfectly suited for high performance textfile parsing.
Here is my SSE2 accelerated ... |
|
atom |
General Talk
|
6 |
17,371 |
01-06-2013, 08:39 PM |
|
|
Thread: Permutation
Post: RE: Permutation
The toggle attack has been replaced by the more efficient toggle*.rule rules.
the permutation attack has been dropped because it isnt that efficient and its still in hashcat CPU or as standalone gene... |
|
atom |
General Talk
|
1 |
6,069 |
01-09-2013, 09:56 PM |
|
|
Thread: Share your vclHashcat-lite speeds
Post: RE: Share your vclHashcat-lite speeds
You guys are crazy :) Nice numbers, gratz! |
|
atom |
General Talk
|
29 |
55,584 |
01-10-2013, 02:41 PM |
|
|
Thread: Ticket Tracing system
Post: RE: Ticket Tracing system
That 8008 thing is no longer required. If it points you there, something in your browser cache is outdated since this no longer exist. |
|
atom |
General Talk
|
21 |
37,698 |
01-23-2013, 11:21 AM |
|
|
Thread: mixed GPU - Just for the fun
Post: RE: mixed GPU - Just for the fun
|
atom |
General Talk
|
4 |
9,346 |
01-28-2013, 10:05 PM |
|
|
Thread: Slight wiki issue
Post: RE: Slight wiki issue
OK, nice find. Should be fixed. Please test. |
|
atom |
General Talk
|
2 |
5,983 |
03-07-2013, 01:25 PM |
|
|
Thread: How does 15 character limitation help in a speed up?
Post: RE: How does 15 character limitation help in a spe...
The main optimization idea bases on the fact that we have W[5] - W[13] (in MD5) set to zero. If its zero there is no need to add the secret key to the intermediate digest because X + 0 = X. For each s... |
|
atom |
General Talk
|
6 |
15,131 |
03-10-2013, 01:13 PM |
|
|
Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos
Yes, this is a common technique. Some websites use CR as salt which leads to all kind of confusing results. |
|
atom |
General Talk
|
8 |
14,743 |
05-02-2013, 11:28 AM |
|
|
Thread: Why the .pot?
Post: RE: Why the .pot?
The main reason for having a potfile in oclHashcat-plus is for --show and --left. |
|
atom |
General Talk
|
2 |
7,703 |
05-03-2013, 07:23 PM |
|
|
Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos
|
atom |
General Talk
|
8 |
14,743 |
05-13-2013, 11:22 AM |
|
|
Thread: Deriving Salt used in Hash
Post: RE: Deriving Salt used in Hash
|
atom |
General Talk
|
1 |
5,290 |
06-10-2013, 09:20 AM |
|
|
Thread: Legal agreements for password audits.
Post: RE: Legal agreements for password audits.
Not sure if this is interessting for you, but all hashcat versions support setting the outfile format. I've added a special outfile format =1 for pentesters that ill only print the cracked hash but no... |
|
atom |
General Talk
|
2 |
6,237 |
06-13-2013, 09:40 PM |
|
|
Thread: Is cracking WPA/TKIP faster than WPA2/AES?
Post: RE: Is cracking WPA/TKIP faster than WPA2/AES?
Wait, oclHashcat-plus is not cracking the cipherstream, it's cracking the handshake. Therefore, it makes no difference in terms of speed if it's WPA1 or WPA2. |
|
atom |
General Talk
|
6 |
22,175 |
08-08-2013, 06:18 AM |
|
|
Thread: Compare and contrast Passcape's rules
Post: RE: Compare and contrast Passcape's rules
Also, KoreLogicRulesAppendNumbers_or_Specials_PrependLetter.rule sounds useless for oclHashcat, we use hybrid attack for such attacks! |
|
atom |
General Talk
|
8 |
18,116 |
08-12-2013, 03:04 PM |
|
|
Thread: Is cracking WPA/TKIP faster than WPA2/AES?
Post: RE: Is cracking WPA/TKIP faster than WPA2/AES?
The slow PBKDF2 part is same for both, which is why they have the same speed. After that, WPA1 uses MD5 while WPA2 uses SHA1 but thats so fast compared to the slow part that you wont see a difference. |
|
atom |
General Talk
|
6 |
22,175 |
08-12-2013, 03:07 PM |
|
|
Thread: Diceware cracking math for @thorsheim
Post: Diceware cracking math for @thorsheim
Basis dictionary from diceware is 7776 words and there are 5 words takes from it.
Makes a total combination keyspace of 7776^5 = 28430288029929701376
Since the diceware RNG is hopefully a perfect o... |
|
atom |
General Talk
|
6 |
15,862 |
09-02-2013, 02:56 PM |