Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: show.log
Post: RE: show.log
Yep, that's a hashcat log file all right. I swear it's acting like you ran something like this:
hashcat --session=show [etc]
That's the only way I know of to get hashcat to save its log file som... |
|
royce |
hashcat
|
6 |
3,651 |
05-26-2018, 10:44 PM |
|
|
Thread: show.log
Post: RE: show.log
Without giving away any sensitive information, can you describe or post what the contents of that file are? |
|
royce |
hashcat
|
6 |
3,651 |
05-24-2018, 03:12 PM |
|
|
Thread: [New User] Unlocking excel file-failed to parse hashes
Post: RE: [New User] Unlocking excel file-failed to pars...
Sounds like the hash isn't in the expected format. If you try the exact same attack on the example 9700 hash here:
https://hashcat.net/wiki/doku.php?id=example_hashes
... does your attack work? ... |
|
royce |
hashcat
|
2 |
2,503 |
05-24-2018, 03:06 PM |
|
|
Thread: show.log
Post: RE: show.log
Unless your command line is customizing the name of the session with --session=show, I don't think hashcat is directly generating this file. |
|
royce |
hashcat
|
6 |
3,651 |
05-24-2018, 08:43 AM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
Assuming a dictionary whose longest word length is (for example) 12, and a four-word passphrase, then the maximum length of the entire passphrase is 12 x 4 = 48. |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-24-2018, 06:25 AM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
YW. Make sure that PW_MAX is 4x the length of your longest word. Enjoy! |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-23-2018, 05:20 PM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
If we assume that the four words are Diceware-style, and truly chosen at random from a list, then for a four-word passphrase, princeprocessor would properly try "barnbarnbarnbarn', etc, but IIRC combi... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-23-2018, 05:16 PM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
There is indeed a max length for princeprocessor.
https://github.com/hashcat/princeprocessor/blob/master/src/pp.c#L32
You'll need to modify the source, increase PW_MAX to at least 20 (in your ca... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-23-2018, 04:27 PM |
|
|
Thread: MS Office NON-ASCII characters
Post: RE: MS Office NON-ASCII characters
Hmm, no strong ideas here yet from me.
Cross-check idea: what method are you using to extract the MS Office hashes? Have you verified your method by setting a simple ASCII password, extracting it, ... |
|
royce |
hashcat
|
2 |
2,072 |
05-21-2018, 05:33 PM |
|
|
Thread: Cracking Turkish/Foreign Hashes
Post: RE: Cracking Turkish/Foreign Hashes
What MD5 is your Python producing? I get:
Code:
--
$ echo -n 'ĞĞ' | md5sum
411019a0840fad007398bcab6cc9188c -
--
... which hashcat cracks, using your syntax:
Code:
--
$ hashcat --... |
|
royce |
hashcat
|
2 |
2,375 |
05-21-2018, 12:41 AM |
|
|
Thread: Hashcat router admin
Post: RE: Hashcat router admin
You're describing an online attack. Hashcat only works for offline attacks (with the hash in hand). |
|
royce |
hashcat
|
4 |
3,096 |
05-20-2018, 11:59 PM |
|
|
Thread: Hash types with multiple iterations/rounds
Post: RE: Hash types with multiple iterations/rounds
Good question!
Arbitrary iteration is currently out of scope for hashcat. atom has previously added specific cases when it's a commonly needed hash, but that's it.
Outside of the hashcat world, ... |
|
royce |
hashcat
|
1 |
4,188 |
05-20-2018, 06:00 PM |
|
|
Thread: R9 270x/GTX960
Post: RE: R9 270x/GTX960
Hashes per second per dollar is indeed the way to think about it - and if electricity price matters, H/s/watt.
For your use case, non-FE would probably be OK. If you can swing a 970, that might be... |
|
royce |
Hardware
|
1 |
1,931 |
05-18-2018, 05:16 AM |
|
|
Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat
I'd also run a benchmark (hashcat -b -m 0) to quickly determine if it's a setup problem vs an attack methodology problem. If your driver/etc are set up correctly, a benchmark should peg all available ... |
|
royce |
Hardware
|
9 |
6,982 |
05-18-2018, 04:45 AM |
|
|
Thread: GPU H/s to router Mbps
Post: RE: GPU H/s to router Mbps
Nope. Totally unrelated ... unless you're using the router itself to crack hashes ;) |
|
royce |
hashcat
|
6 |
3,866 |
05-18-2018, 04:44 AM |
|
|
Thread: GPU H/s to router Mbps
Post: RE: GPU H/s to router Mbps
There is no relationship between WPA2 hash speed and wireless bandwidth speeds. |
|
royce |
hashcat
|
6 |
3,866 |
05-17-2018, 09:58 PM |
|
|
Thread: [split] hashcat v4.1.0
Post: RE: hashcat v4.1.0
Rangletrap, please read the forum rules:
https://hashcat.net/forum/archive/index.php?announcement-2.html
* Do not post hashes
* Do not ask people to crack your hashes
* Do not hijack threads (... |
|
royce |
hashcat
|
1 |
1,577 |
05-17-2018, 06:07 PM |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
So I guess the answer to your question is "no"? :P :)
Sounds reproducible, so good catch. The steps necessary to reproduce, in a GitHub issue, would make this actionable. |
|
royce |
hashcat
|
13 |
32,462 |
05-17-2018, 05:43 AM |
|
|
Thread: Introduction
Post: RE: Introduction
Welcome! Interesting thread idea - we'll see if it takes root! |
|
royce |
General Talk
|
2 |
2,625 |
05-17-2018, 05:41 AM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
Yep. The only way to make real progress on it would be if multiple teams with lots of cards all cooperated. Which would itself be pretty cool, IMO. |
|
royce |
General Talk
|
9 |
7,198 |
05-14-2018, 04:45 PM |