Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Password limit of 16 chars - md5crypt
Post: RE: Password limit of 16 chars - md5crypt
You know how high chances are you find passwords of length 16 and more? |
|
atom |
Old hashcat Support
|
5 |
13,683 |
11-26-2012, 11:18 AM |
|
|
Thread: Password length issues
Post: RE: Password length issues
Not supported as this would require two sha256 transform calls |
|
atom |
Old hashcat Support
|
5 |
8,316 |
10-23-2014, 10:27 AM |
|
|
Thread: Password in hidden truecrypt file not found...
Post: RE: Password in hidden truecrypt file not found...
For -hidden- TC volumes you need to skip the first 64k of data, read here how to do it:
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_truecrypt_vo... |
|
atom |
Old oclHashcat Support
|
2 |
5,150 |
12-30-2015, 03:49 PM |
|
|
Thread: Password generation from HDD
Post: RE: Password generation from HDD
I never thought about creating a wordlist this way. In theory you should be able to do "strings /dev/sda", that should work and if there's hidden data you should get it with this as well... |
|
atom |
General Help
|
3 |
8,290 |
02-13-2014, 07:58 PM |
|
|
Thread: Password Decoration Rule
Post: RE: Password Decoration Rule
Thanks for this share! Actually cracked some of my uncrackable hashes list :) |
|
atom |
User Contributions
|
24 |
54,401 |
06-08-2012, 10:16 AM |
|
|
Thread: Password Decoration Rule
Post: RE: Password Decoration Rule
If you want them in the distribution, no problem. But they should be somehow different to the ones that already included. Otherwise it would make no sense. |
|
atom |
User Contributions
|
24 |
54,401 |
06-08-2012, 11:25 AM |
|
|
Thread: Password Decoration Rule
Post: RE: Password Decoration Rule
Thats fine, oclHashcat limits the maximum number of functions per rule |
|
atom |
User Contributions
|
24 |
54,401 |
01-25-2013, 12:00 PM |
|
|
Thread: Password Decoration Rule
Post: RE: Password Decoration Rule
No plans for that, actually its not possible because of some hard limitations from GPU |
|
atom |
User Contributions
|
24 |
54,401 |
01-25-2013, 01:19 PM |
|
|
Thread: Password Decoration Rule
Post: RE: Password Decoration Rule
Yes that fine @ Wiki
There will be no problem @ hashcat pipe. There is also no such limit for slow hashes in oclHashcat-plus, thats only for fast hashes (different rule engine). |
|
atom |
User Contributions
|
24 |
54,401 |
01-25-2013, 02:25 PM |
|
|
Thread: Password Analyzer by TrAnn3l
Post: RE: Password Analyzer by TrAnn3l
|
atom |
User Contributions
|
1 |
8,076 |
11-11-2013, 04:30 PM |
|
|
Thread: Passphrase help
Post: RE: Passphrase help
Hashcat itself does not support the generation of "passphrases", but supports reading from stdin. What you need to find a tool to generate passphrases and then pipe the output to hashcat. |
|
atom |
hashcat
|
2 |
3,365 |
12-07-2016, 07:35 PM |
|
|
Thread: Partially known password + md5 hash + trouble cracking
Post: RE: Partially known password + md5 hash + trouble ...
a third alternative is using a fifo, but this works on linux only. |
|
atom |
General Help
|
5 |
17,248 |
01-28-2012, 10:16 AM |
|
|
Thread: Partial-Hash
Post: RE: Partial-Hash
I think you are searching for a program to collide (collision) a hash. Hashcat is not made for this. |
|
atom |
General Help
|
1 |
5,692 |
11-05-2012, 01:05 PM |
|
|
Thread: parsing restore file
Post: RE: parsing restore file
note that the restore structure changes massively with v1.20.
also see this:
https://hashcat.net/forum/thread-3047.html |
|
atom |
Old oclHashcat Support
|
6 |
10,397 |
04-15-2014, 06:13 PM |
|
|
Thread: parsing restore file
Post: RE: parsing restore file
oclHashcat v1.20 has a new parameter that will help you integrating called --status-automat that you can simply read from stdout |
|
atom |
Old oclHashcat Support
|
6 |
10,397 |
04-16-2014, 08:25 AM |
|
|
Thread: Parsing multipe wpa handshake from a merged cap file.
Post: RE: Parsing multipe wpa handshake from a merged ca...
Can aircrack read the extract.cap (the one output by tshark) without using the -J?
If not, I'd say tshark destroyed it, at least for using it with aircrack |
|
atom |
General Help
|
4 |
16,628 |
01-09-2015, 11:52 AM |
|
|
Thread: Parsing multipe wpa handshake from a merged cap file.
Post: RE: Parsing multipe wpa handshake from a merged ca...
In that case don't use the combination of tshark + aircrack for convert. You can use cap2hccap I think it has an builtin filter. |
|
atom |
General Help
|
4 |
16,628 |
01-09-2015, 04:59 PM |
|
|
Thread: Parse Database
Post: RE: Parse Database
The hashcat way to do this is using --show: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpas... |
|
atom |
General Talk
|
8 |
8,950 |
01-27-2017, 11:54 PM |
|
|
Thread: Parameters for passwords
Post: RE: Parameters for passwords
If you use -a 6 hybrid attack that means you have a mask. The mask will add N length to the candidates, depending on your mask. Means if you subtract that length from your maximum password length, all... |
|
atom |
hashcat
|
1 |
3,213 |
08-19-2016, 09:20 AM |
|
|
Thread: Packages for Linux distributions
Post: RE: Packages for Linux distributions
Yes, that's correct. I just wanted to start the discussion. I think what we need is a list of paths we'd need to change to make it more compatible.
Btw. this _maybe_ has influence on the windows p... |
|
atom |
hashcat
|
12 |
18,959 |
12-08-2015, 01:01 AM |