Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
|
atom |
User Contributions
|
182 |
305,357 |
12-30-2016, 11:27 AM |
|
|
Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence
thanks for replying. this is an old thread, i will close it now.
the solution has been made already, see here: https://hashcat.net/forum/thread-1291.html |
|
atom |
Very old oclHashcat-plus Support
|
125 |
250,692 |
09-04-2012, 02:04 PM |
|
|
Thread: Review - AMD Radeon R9 290X
Post: RE: Review - AMD Radeon R9 290X
There is 13.12 stable now, you might want to try again with that one |
|
atom |
Hardware
|
75 |
215,991 |
12-21-2013, 04:57 PM |
|
|
Thread: oclHashcat-plus v0.15
Post: oclHashcat-plus v0.15
This version is the result of over 6 months of work, having modified 618,473 total lines of source code.
Before we go into the details of the changes, here's a quick summary of the major changes:
Add... |
|
atom |
Very old oclHashcat-plus Announcements
|
31 |
215,939 |
08-24-2013, 08:03 PM |
|
|
Thread: oclHashcat-plus v0.15
Post: RE: oclHashcat-plus v0.15
Kuci Wrote: (08-31-2013, 06:57 PM)
--
@atom: What is up with HMAC-SHA256 ? I thought it will be implemented in this release, but I can not see it even in beta version. On Trac I see it is already ac... |
|
atom |
Very old oclHashcat-plus Announcements
|
31 |
215,939 |
09-02-2013, 12:09 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
|
atom |
User Contributions
|
47 |
208,523 |
04-07-2013, 06:55 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
I've used 0.15 beta which is not yet public. You need to wait for next release. |
|
atom |
User Contributions
|
47 |
208,523 |
04-10-2013, 08:22 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
AFAIK Android 5.x uses a different scheme, therefore it will not work |
|
atom |
User Contributions
|
47 |
208,523 |
05-26-2015, 12:50 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
The optimal maskfile, according to the policy you've posted, would be:
Quote:
--
?u?l?l?l
?l?u?l?l
?l?l?u?l
?l?l?l?u
--
You can generate them with PACK 0.4 |
|
atom |
User Contributions
|
47 |
208,523 |
05-04-2016, 12:31 PM |
|
|
Thread: SL3, they did it again
Post: SL3, they did it again
Some time ago a beta-tester took one of the first betas of oclHashcat-lite and SOLD IT to people from SL3 scene. As a consequence I've added keyfiles to beta versions. Then they cracked the timebomb i... |
|
atom |
Very old oclHashcat-lite Support
|
71 |
191,522 |
01-01-2013, 06:25 PM |
|
|
Thread: SL3, they did it again
Post: RE: SL3, they did it again
Thread is closed, thanks! |
|
atom |
Very old oclHashcat-lite Support
|
71 |
191,522 |
01-09-2013, 10:03 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
martin.po21 Wrote: (02-06-2017, 11:39 PM)
--
However, I tested this on a capture file I already cracked and therefor I know capture is indeed valid (ATT?d?d?d network with default pass of 10 digits)-... |
|
atom |
User Contributions
|
49 |
179,622 |
02-07-2017, 11:28 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
rico Wrote: (02-07-2017, 01:01 AM)
--
Great stuff, handshake capturing always a tricky business. I just gave cap2hccapx a quick spin but didn't have much luck either I'm afraid. cap2hccapx seems to i... |
|
atom |
User Contributions
|
49 |
179,622 |
02-07-2017, 11:49 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
After some testing, that error:
Quote:
--
Invalid hccapx eapol size
--
and/or
Quote:
--
Invalid hccapx signature
--
is somehow related to windows beta binaries. We'll try to fix. |
|
atom |
User Contributions
|
49 |
179,622 |
02-07-2017, 12:09 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
I've just upload hashcat beta 104. With it, you should be able to load the hccapx on windows, too. If it works I don't need the .cap. |
|
atom |
User Contributions
|
49 |
179,622 |
02-07-2017, 12:29 PM |
|
|
Thread: New hccapx format explained
Post: New hccapx format explained
A few days ago a user came into the #hashcat IRC channel and reported to have problems cracking one of his WPA handshake captures. No worries, the user knew the password to the WPA handshake so this s... |
|
atom |
User Contributions
|
49 |
179,622 |
02-06-2017, 10:29 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
Hehe, I guess in that case it will not take long to update it again, allowing it for combining of packets :) |
|
atom |
User Contributions
|
49 |
179,622 |
02-09-2017, 10:51 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
Also note that this feature is kind of unique in the WPA/WPA2 cracking world. There's no other cracker (both commercial and non-commercial) that combines the packets in such a way that they produce at... |
|
atom |
User Contributions
|
49 |
179,622 |
02-08-2017, 09:45 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
abdou99 Wrote: (02-10-2017, 02:29 PM)
--
If you are saying that both values: 0 and 1 are crackable
so what's the news?
value = 0 ==> 50% Crackable
value = 1 ==> 100% Crackable
is that what are ... |
|
atom |
User Contributions
|
49 |
179,622 |
02-10-2017, 03:09 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
You can use the 3rd (optional) parameter of cap2hccapx to select a specific ESSID only. |
|
atom |
User Contributions
|
49 |
179,622 |
02-15-2017, 09:01 PM |