Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Just use -m 9700 then and crack as normal |
|
atom |
hashcat
|
13 |
10,132 |
01-24-2018, 11:02 AM |
|
|
Thread: Combinator Attac
Post: RE: Combinator Attac
./hashcat -a 1 dict1.txt dict2.txt --stdout | ./hashcat -m 13000 hash.txt |
|
atom |
hashcat
|
7 |
6,044 |
01-24-2018, 11:03 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Just use ?a?a?a?a?a?a?a?a?a it will crack one pretty soon. This might not be the correct one, but it will be good enough to open the document. |
|
atom |
hashcat
|
13 |
10,132 |
01-27-2018, 10:12 PM |
|
|
Thread: Trying to increase performance of mask attack with a two character prefix
Post: RE: Trying to increase performance of mask attack ...
The strategy to use -m 20 is the right one as -m 20 is around 10-100 times faster than -m 0 if the mask has a static prefix. The reason why this is not in your case is because your prefix is not entir... |
|
atom |
hashcat
|
9 |
6,972 |
01-28-2018, 07:17 PM |
|
|
Thread: Electrum support - aes_decrypt (sha256 (sha256 ($pass), $data)
Post: RE: Electrum support - aes_decrypt (sha256 (sha25...
Electrum support (salt-type 1) has been added to hashcat. You can use the beta https://hashcat.net/beta/ |
|
atom |
hashcat
|
32 |
25,733 |
01-29-2018, 02:09 PM |
|
|
Thread: Electrum support - aes_decrypt (sha256 (sha256 ($pass), $data)
Post: RE: Electrum support - aes_decrypt (sha256 (sha25...
|
atom |
hashcat
|
32 |
25,733 |
01-30-2018, 11:59 AM |
|
|
Thread: DES-ECB brute force
Post: RE: DES-ECB brute force
Your hash is formated wrong. See here:
Code:
--
root@et:~/hashcat# ./hashcat -m 14000 b5866d1dd5cdf934:47dc9810ade39295 -a 3 --quiet --hex-charset 6861736863617431 --outfile-format 5 --potfile-d... |
|
atom |
General Talk
|
5 |
5,241 |
02-01-2018, 07:25 PM |
|
|
Thread: DES-ECB brute force
Post: RE: DES-ECB brute force
You just have to switch:
b5866d1dd5cdf934:47dc9810ade39295
to
47dc9810ade39295:b5866d1dd5cdf934 |
|
atom |
General Talk
|
5 |
5,241 |
02-01-2018, 07:34 PM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
The main difference between older version and 3.5+ is that we're doing the nonce error corrections, as described in detail here: https://hashcat.net/forum/thread-6361.html
You can turn it off in v4... |
|
atom |
hashcat
|
13 |
18,419 |
02-02-2018, 04:43 PM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
Please post full output of hashcat -b -m 2500 and hashcat -I |
|
atom |
hashcat
|
13 |
18,419 |
02-02-2018, 09:38 PM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
We did some more changes to the code. Please download latest RC (RC6) from https://hashcat.net/beta/ or compiler from github master and retry. |
|
atom |
hashcat
|
13 |
18,419 |
02-03-2018, 02:54 PM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
The problem is that with v3.4 to 4.x the maximum supported password length went up from 64 (in theory) to 256. When using -a 0, all the data has been copied over pci-express. With 4.x, that size is 4 ... |
|
atom |
hashcat
|
13 |
18,419 |
02-03-2018, 07:51 PM |
|
|
Thread: PCIe transfer compression
Post: PCIe transfer compression
While trying to find the cause of the performance loss of WPA in version 4.x discussed in this thread https://hashcat.net/forum/thread-7251.html we found the root of the problem and were able to build... |
|
atom |
User Contributions
|
2 |
4,729 |
02-05-2018, 06:18 PM |
|
|
Thread: DES decryption
Post: RE: DES decryption
I think you mean with candidates only those who crack the hash because of the truncation. In that case you want --keep-guessing |
|
atom |
General Talk
|
6 |
8,305 |
02-07-2018, 07:14 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
I think once the pid > 64k it goes back to 0. In that case the user can have hashcat running on 5. |
|
atom |
hashcat
|
7 |
10,362 |
02-07-2018, 07:18 PM |
|
|
Thread: Possible 16 digit combinations
Post: RE: Possible 16 digit combinations
It's a bad attack if you run a Fixed value in the beginning of the "Password". Use -m 20 instead, you will get a speedup of at least 100. |
|
atom |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
3,712 |
02-07-2018, 07:21 PM |
|
|
Thread: Ryzen (OpenCL) with Hashcat
Post: RE: Ryzen (OpenCL) with Hashcat
AFAIK there'S no dedicated ryzen driver. But the Intel OpenCL runtime supports its (pretty good). |
|
atom |
hashcat
|
3 |
3,532 |
02-07-2018, 07:23 PM |
|
|
Thread: Hashcat pid/outfiles error
Post: RE: Hashcat pid/outfiles error
Please retry with hashcat v4.1.0 beta from here: https://hashcat.net/beta/ |
|
atom |
hashcat
|
4 |
4,955 |
02-08-2018, 03:04 PM |
|
|
Thread: Bitlocker
Post: RE: Bitlocker
Adding new hash-modes to hashcat isn't too hard for someone with a bit of C programming skills :) |
|
atom |
hashcat
|
4 |
8,670 |
02-13-2018, 10:36 AM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
You can run two instances of hashcat and pipe the output of the first as input to the second while using the prepend rules on the first and the append rules on the second. |
|
atom |
hashcat
|
6 |
5,813 |
02-13-2018, 10:39 AM |