Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[desc]
|
|
|
Thread: Password cracking guidance
Post: RE: Password cracking guidance
The magic word you're missing is "LUKS".
This should yield a few reasonable howtos:
https://www.google.com/search?q=LUKS+hashcat |
|
royce |
hashcat
|
1 |
1,241 |
08-06-2019, 05:05 AM |
|
|
Thread: I'm using Windows - where does combinator.exe write out to?
Post: RE: I'm using Windows - where does combinator.exe ...
The canonical way to do this is simply pipe the output of combinator to hashcat itself, so you don't have to store the result anywhere.
combinator list1 list2 | hashcat ... |
|
royce |
hashcat
|
2 |
1,064 |
08-14-2019, 02:35 AM |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
Example method - script by atom.
Code:
--
#!/usr/bin/perl
use strict;
use warnings;
use MIME::Base64;
while (my $line = )
{
chomp $line;
my @data = split '\$', $line;
if ($data[5] ne 64)
... |
|
royce |
hashcat
|
2 |
1,189 |
08-14-2019, 04:15 PM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
Is the container mounted? You'll need to provide the path to the raw file, the raw device, or else extract the first 512 bytes and save that to a file to provide to hashcat.
Also, from your cmdline... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-18-2019, 05:19 PM |
|
|
Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...
There's no single mask. You have to generate a *list of masks*.
You can do this with policygen from the PACK toolkit.
https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-... |
|
royce |
hashcat
|
2 |
1,220 |
08-18-2019, 06:24 PM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
Ha! I think I've just always wanted that syntax; didn't even give me pause. :D |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-18-2019, 07:29 PM |
|
|
Thread: My private dictionary from hundreds of sources
Post: RE: My private dictionary from hundreds of sources
First, thanks for thinking to contribute!
I don't want to rain on your parade ... but wordlists without attribution can sometimes be problematic. Everyone goes through this phase. ;)
Code:
--
$ wc... |
|
royce |
User Contributions
|
2 |
2,829 |
08-19-2019, 04:40 AM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
There's no install - you just download it by whatever means you can, and then transfer it to where you need to run it, and then compile+run. |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 02:28 AM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
Yep, the GitHub repo says that it's as simple as that. |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 02:43 AM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
Looking at the Makefile, it looks pretty vanilla - I see OpenSSL (which most Linux systems will have). If you encounter an error, post and we'll tackle it together. :) |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 03:06 AM |
|
|
Thread: Help me install hxctools
Post: RE: Help me install hxctools
Well, you could ask in this thread:
https://hashcat.net/forum/thread-6661.html |
|
royce |
hashcat
|
3 |
1,607 |
08-26-2019, 03:37 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
Huh, I didn't know this. Not sure what is the best way to express this in the --help output, but it feels important enough to try. |
|
royce |
hashcat
|
8 |
3,443 |
08-26-2019, 03:38 PM |
|
|
Thread: Rule Question
Post: RE: Rule Question
Fair question.
If the rule file contains the "do nothing" rule directive ( : - just a colon by itself), then the original unmodified input words will be used. |
|
royce |
hashcat
|
3 |
1,245 |
08-26-2019, 03:50 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
Hello! Please post in English. Use Google Translate if you need to.
Here is a Google Translate translation of the above:
I am learning hashcat, but its instructions make me a headache. I searched a ... |
|
royce |
hashcat
|
4 |
1,879 |
09-01-2019, 07:06 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
https://www.google.com/search?q=hashcat+%28novice+OR+beginner%29+%28tutorial+OR+howto%29
... yields:
https://laconicwolf.com/2018/09/29/hashcat-tutorial-the-basics-of-cracking-passwords-with-has... |
|
royce |
hashcat
|
4 |
1,879 |
09-02-2019, 04:37 PM |
|
|
Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...
And if it needs to be more than two words wide, you can do something crude like this:
https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2 |
|
royce |
hashcat
|
3 |
1,428 |
09-04-2019, 02:41 PM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
So you know the base word, and you need to append some a special and two numbers?
-r ./rules/hybrid/append_s.rule -r ./rules/hybrid/append_d.rule -r -r ./rules/hybrid/append_d.rule |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 02:09 AM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
Because masks are executed on GPU, it's probably much faster to just run it as a hybrid (-a 6) or mask attack. |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 03:43 AM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified.
It defaults to this mask:
-1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 06:42 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max. |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 06:50 PM |