Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: PHDays Hashrunner challenge 2015
Post: RE: PHDays Hashrunner challenge 2015
Congratulations for your victory Team Hashcat. Your write-up was very well written too and interesting to read. One thing also missing from the contest is the detailed pointing system. We know that... |
|
mastercracker |
Organisation and Events
|
11 |
23,249 |
05-20-2015, 12:00 PM |
|
|
Thread: PHDays Hashrunner challenge 2015
Post: RE: PHDays Hashrunner challenge 2015
Never mind, the page is still there. |
|
mastercracker |
Organisation and Events
|
11 |
23,249 |
05-21-2015, 12:57 AM |
|
|
Thread: PHDays Hashrunner challenge 2015 - Writeup
Post: RE: PHDays Hashrunner challenge 2015 - Writeup
epixoip Wrote: (05-21-2015, 06:05 AM)
--
JTR does have scrypt support...
https://github.com/magnumripper/JohnTheRipper/search?q=scrypt
--
I got the precompiled binaries from 1.8.0 jumbo1 (win64) and... |
|
mastercracker |
Organisation and Events
|
14 |
39,742 |
05-21-2015, 11:39 AM |
|
|
Thread: PHDays Hashrunner challenge 2015 - Writeup
Post: RE: PHDays Hashrunner challenge 2015 - Writeup
epixoip Wrote: (05-21-2015, 10:45 PM)
--
If you look at the plugin you will see the format it expects:
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/src/scrypt_fmt.c#L54-78
... |
|
mastercracker |
Organisation and Events
|
14 |
39,742 |
05-22-2015, 04:44 AM |
|
|
Thread: PHDays Hashrunner challenge 2015 - Writeup
Post: RE: PHDays Hashrunner challenge 2015 - Writeup
gearjunkie Wrote: (05-22-2015, 05:12 AM)
--
I had a similar issue. If you downloaded the Window pre-compiled binary then you are unlikely to be using the latest bleeding jumbo. Try this command bel... |
|
mastercracker |
Organisation and Events
|
14 |
39,742 |
05-22-2015, 11:40 AM |
|
|
Thread: planning display adapter change
Post: RE: planning display adapter change
Your 2 last choices of GPU are not supported anymore (well, the drivers don't support them anymore) |
|
mastercracker |
Hardware
|
6 |
8,733 |
08-21-2015, 12:00 PM |
|
|
Thread: Please correct my command regarding on bruteforcing/mask attack
Post: RE: Please correct my command regarding on brutefo...
It's the same command line for 1 or multiple hashes. The program gets them from test.txt. |
|
mastercracker |
General Help
|
10 |
25,543 |
02-04-2014, 01:12 PM |
|
|
Thread: Please correct my command regarding on bruteforcing/mask attack
Post: RE: Please correct my command regarding on brutefo...
Just to clarify previous post. Your mask will crack only 5 chars length. You simply add the -i to your command and it will do from 1 to 5.
Code:
--
hashcat-cli64.exe -m 0 -a 3 -i test.txt ?a?a?a?a?... |
|
mastercracker |
General Help
|
10 |
25,543 |
02-04-2014, 03:32 PM |
|
|
Thread: Please correct my command regarding on bruteforcing/mask attack
Post: RE: Please correct my command regarding on brutefo...
oops, my bad. Forgot that difference. |
|
mastercracker |
General Help
|
10 |
25,543 |
02-05-2014, 02:55 AM |
|
|
Thread: PLEASE HELP!_MASK with 8-20 abcABC123...
Post: RE: PLEASE HELP!_MASK with 8-20 abcABC123...
Subcortex Wrote: (11-23-2015, 11:38 AM)
--
how to make a mask with the parameters of minimum 8 characters to maximum 20 charakters with various digits and abc../ABC.. - but WITHOUT the -a function an... |
|
mastercracker |
Old hashcat Support
|
14 |
20,032 |
11-23-2015, 12:38 PM |
|
|
Thread: plus b53 rule length limit ?
Post: RE: plus b53 rule length limit ?
That would be new then because the wiki says that the limit is 10:
Quote:
--
With oclhashcat-plus, currently the number of functions a single rule line or collective of multi-rules to single line ... |
|
mastercracker |
Beta Tester
|
4 |
4,432 |
07-18-2013, 12:17 PM |
|
|
Thread: Possibility of zip archive password cracking?
Post: RE: Possibility of zip archive password cracking?
To add to what chort said, it's also possible to do it with Oclhashcat-plus if you use dictionary + rules. You have bugs as a dictionary, use a first rule file to add the 00, 01, 02, etc, a second ru... |
|
mastercracker |
Feature Requests
|
27 |
130,517 |
02-07-2012, 07:46 PM |
|
|
Thread: Possible bug
Post: RE: Possible bug
atom Wrote: (05-27-2010, 09:54 AM)
--
iirc, the character ^ is (was?) the escape character on windows shell. so it is possible to create problems. not really sure about.
at least on my win7 box it... |
|
mastercracker |
Very old oclHashcat Support
|
3 |
10,043 |
05-30-2010, 04:55 AM |
|
|
Thread: Possible OCLhashcat+ bug
Post: RE: Possible OCLhashcat+ bug
atom Wrote: (02-15-2011, 03:58 PM)
--
any news here?
--
I assumed that you were correct and did not do anything further but just to make sure that we are not missing something out, I will do it tomor... |
|
mastercracker |
Very old oclHashcat-plus Support
|
9 |
20,373 |
02-16-2011, 03:28 AM |
|
|
Thread: Possible OCLhashcat+ bug
Post: RE: Possible OCLhashcat+ bug
Oops. Looks like a problem here's the -output-format=2
4144e195f46de78a3623da7364d04f11:a:61
93b885adfe0da089cdf634904fd59f71::
dd1c7ceb4c92653a696b7907a4dd4df1:C:43
13757e0fb71915e385efa4dc9d1... |
|
mastercracker |
Very old oclHashcat-plus Support
|
9 |
20,373 |
02-17-2011, 06:07 AM |
|
|
Thread: Possible OCLhashcat+ bug
Post: RE: Possible OCLhashcat+ bug
Just in case Atom missed it, the problem is existant. From what I noticed, it seems to crack a password but sometime then assign it to the wrong hash. For all the wrong Hash:Password pair, the passw... |
|
mastercracker |
Very old oclHashcat-plus Support
|
9 |
20,373 |
02-23-2011, 07:02 PM |
|
|
Thread: Possible OCLhashcat+ bug
Post: RE: Possible OCLhashcat+ bug
Replicated the problem with mode 1000... |
|
mastercracker |
Very old oclHashcat-plus Support
|
9 |
20,373 |
02-26-2011, 05:59 AM |
|
|
Thread: Possible OCLhashcat+ bug
Post: RE: Possible OCLhashcat+ bug
atom Wrote: (02-26-2011, 09:36 AM)
--
that was a good hint mastercracker. i found somthing. it is exactly as i said in the beginning. it is salted with a null-byte. or better said its the unicode ver... |
|
mastercracker |
Very old oclHashcat-plus Support
|
9 |
20,373 |
02-27-2011, 03:59 AM |
|
|
Thread: Prepend and append values
Post: RE: Prepend and append values
If word1 and word2 are the same for every hash (not word1=word2 but word1pass1word2 and word1pass2word2 will have the same word1 value for example), then your mask approach would be the way to go sinc... |
|
mastercracker |
General Help
|
3 |
8,074 |
01-14-2014, 08:04 PM |
|
|
Thread: Problem on rc4
Post: RE: Problem on rc4
I can't test it right now but yes, I am on Windows 7 x64 as well (see my first post). |
|
mastercracker |
Beta Tester
|
19 |
16,724 |
08-23-2013, 06:31 PM |