Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Proper method to extract the hash from a PDF file?
Post: RE: Proper method to extract the hash from a PDF f...
It should be enough to use the right mode.
You can use this as a reference: https://hashcat.net/wiki/doku.php?id=example_hashes |
|
atom |
Old oclHashcat Support
|
11 |
43,599 |
03-27-2015, 01:20 PM |
|
|
Thread: email:hash to email:unhash?
Post: RE: email:hash to email:unhash?
I'd recommend to stick to --username and --show https://hashcat.net/forum/thread-4136.html |
|
atom |
Old hashcat Support
|
4 |
23,149 |
03-27-2015, 01:21 PM |
|
|
Thread: Question about keyspace
Post: RE: Question about keyspase
Yes, you need to modify your script |
|
atom |
Old oclHashcat Support
|
3 |
5,090 |
03-27-2015, 01:22 PM |
|
|
Thread: Proper method to extract the hash from a PDF file?
Post: RE: Proper method to extract the hash from a PDF f...
Well, there is no regexp in hashcat. But using my reference you should be able to write your own |
|
atom |
Old oclHashcat Support
|
11 |
43,599 |
03-27-2015, 01:33 PM |
|
|
Thread: Question about keyspace
Post: RE: Question about keyspase
|
atom |
Old oclHashcat Support
|
3 |
5,090 |
03-27-2015, 10:59 PM |
|
|
Thread: WPA Combination attack (skipping passwords)
Post: RE: WPA Combination attack (skipping passwords)
Since -a1 (and -a6 and -a7 as well) change the length of the password candidate on gpu, there's no way to skip them anymore. If you want them skipped, use combinator.bin from hashcat-utils and pipe |
|
atom |
Old oclHashcat Support
|
2 |
5,123 |
03-30-2015, 11:07 AM |
|
|
Thread: Combinator attack not recognizing -j rule
Post: RE: Combinator attack not recognizing -j rule
I can reproduce the problem. Please open a TRAC Ticket.
There's a workaround: Instead of "-j $-" you can use "-k i0-".
PS: You could also use ^ but ^ is the escape character on windows, so you m... |
|
atom |
Old oclHashcat Support
|
4 |
7,718 |
03-30-2015, 11:17 AM |
|
|
Thread: des / 3des question
Post: RE: des / 3des question
As I said already, you can't brute-forece AES or 3DES. The only chance is if there's a human involved in the crypto process. If a human chooses a password it's typically send through a KDF which is th... |
|
atom |
General Help
|
4 |
7,791 |
03-30-2015, 11:21 AM |
|
|
Thread: hybrid dic + mask
Post: RE: hybrid dic + mask
You can not do this with a hybrid attack. But you can do it with stacked rules:
./oclHashcat -a 0 hash.txt -r rules/hybrid/prepend_d.rule -r rules/hybrid/append_d.rule
this would by like:
?dD... |
|
atom |
General Help
|
2 |
4,946 |
03-30-2015, 11:24 AM |
|
|
Thread: Combinator attack not recognizing -j rule
Post: RE: Combinator attack not recognizing -j rule
fixed in latest beta -- thanks! |
|
atom |
Old oclHashcat Support
|
4 |
7,718 |
04-01-2015, 04:14 PM |
|
|
Thread: Generate NUM random rules
Post: RE: Generate NUM random rules
You can not save the generated rule with -g
But there's a standalone utility that does exactly the same in hashcat-utils:
Quote:
--
root@et:~/hashcat-utils-1.2# ./generate-rules.bin 2
$,
s... |
|
atom |
Old oclHashcat Support
|
11 |
13,639 |
04-03-2015, 11:54 PM |
|
|
Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?
That's an interessting question. Thing is, we dropped native permutation attack from oclHashcat a while back. But even then it was not really an option becuase there was no way to add a separator char... |
|
atom |
Old oclHashcat Support
|
30 |
45,031 |
04-05-2015, 09:00 PM |
|
|
Thread: Brute-force TrueCrypt non-system partition
Post: RE: Brute-force TrueCrypt non-system partition
yeah, part of every modern linux basic installation |
|
atom |
Old oclHashcat Support
|
3 |
6,590 |
04-05-2015, 09:01 PM |
|
|
Thread: 6 x 7990's using ASUS BTC mining motherboard WPA2
Post: RE: 6 x 7990's using ASUS BTC mining motherboard W...
In this case, (h)ashes per second is the same as keys per second.
4x7990 = 8x7970 ~ 1,12 Mh/s
For a keyspace of 00000000 - 99999999 this means it would take 90 seconds.
Note that the 7990 is ... |
|
atom |
Hardware
|
5 |
10,453 |
04-05-2015, 09:05 PM |
|
|
Thread: [HELP] Read russian,arabic, chinese,ecc.. from a wordlist
Post: RE: [HELP] Read russian,arabic, chinese,ecc.. from...
then you need to guess, try all encodings |
|
atom |
Old oclHashcat Support
|
4 |
8,309 |
04-05-2015, 11:31 PM |
|
|
Thread: Help with a specific mask or rule
Post: RE: Help with a specific mask or rule
indeed and with tmesis.pl from hashcat-utils you can let auto-generate them for you |
|
atom |
Old oclHashcat Support
|
6 |
9,413 |
04-05-2015, 11:32 PM |
|
|
Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?
Well if you stick to mask-attack the maximum is 55, so I really think you want to do that |
|
atom |
Old oclHashcat Support
|
30 |
45,031 |
04-05-2015, 11:35 PM |
|
|
Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Maximum length of 31? Why?
If you use -a 3 (mask-attack) it will work because the limit with mask attack is 55.
Quote:
--
root@et:~/oclHashcat-1.36# ./oclHashcat64.bin -m 100 hash '8|7|9|4|2|10|6|11|12|1|0|5|13|3|14' -a 3... |
|
atom |
Old oclHashcat Support
|
30 |
45,031 |
04-05-2015, 11:37 PM |
|
|
Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?
OK, here's the solution:
##
## generate base
##
Quote:
--
$ cat perm-input.txt
0123456789
--
Quote:
--
$ /root/hashcat-utils-1.2/permute.bin < perm-input.txt | more
0123456789
1023456789
2013... |
|
atom |
Old oclHashcat Support
|
30 |
45,031 |
04-06-2015, 03:15 AM |
|
|
Thread: HMAC-SHA1 mask
Post: RE: HMAC-SHA1 mask
You were pretty close, just the message is to long (max. 32) and you need to quote differently:
Quote:
--
$ echo -n "This is a long salt" | openssl dgst -sha1 -hmac "key" ... |
|
atom |
General Help
|
3 |
12,983 |
04-06-2015, 05:29 PM |