Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Cyrillic --> English transliterated passwords wordlist
Post: RE: Cyrillic --> English transliterated passwords ...
RealEnder, wlc was new to me - thanks for the tip, looks very useful. |
|
royce |
hashcat
|
7 |
6,887 |
12-01-2017, 05:45 PM |
|
|
Thread: Descrypt 8 Char PW
Post: RE: Descrypt 8 Char PW
For a single 1060, it will still take four months, I would think. |
|
royce |
General Talk
|
10 |
8,115 |
11-30-2017, 07:22 PM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
epixoip Wrote: (11-28-2017, 05:02 AM)
--
I can't really explain it any better than I already did in the thread you linked to. I guess I can try to expand upon it.
--
Great writeup. Totally stealing... |
|
royce |
hashcat
|
15 |
20,288 |
11-30-2017, 05:26 PM |
|
|
Thread: Descrypt 8 Char PW
Post: RE: Descrypt 8 Char PW
Faster base clock (1708 MHz vs1050 MHz) ?
https://www.nvidia.com/en-us/geforce/products/10series/geforce-gtx-1060/
https://www.geforce.com/hardware/desktop-gpus/geforce-gtx-970/specifications |
|
royce |
General Talk
|
10 |
8,115 |
11-30-2017, 05:21 PM |
|
|
Thread: complex md5 salted hash
Post: RE: complex md5 salted hash
Yes, if I understand you correctly - if you're only attacking a single salt, then appending a hyphen to the end of the salt would have the same effect. |
|
royce |
hashcat
|
1 |
2,518 |
11-30-2017, 04:57 AM |
|
|
Thread: Descrypt 8 Char PW
Post: RE: Descrypt 8 Char PW
undeath, cool - yours? Was that under -w 4?
Here's one for 6x 1080s, -w 4:
Code:
--
Hash.Type........: descrypt, DES (Unix), Traditional DES
Time.Started.....: Wed Nov 29 14:20:19 2017 (1 mi... |
|
royce |
General Talk
|
10 |
8,115 |
11-30-2017, 01:23 AM |
|
|
Thread: Max Pass Length using Wordlists
Post: RE: Max Pass Length using Wordlists
Unless you're attacking a slow hash, it may not be worth skipping the longer files.
If it's a slow hash, you could use 'combinator' from hashcat-utils, and then pipe that through 'len' (also from h... |
|
royce |
hashcat
|
7 |
5,993 |
11-29-2017, 10:40 PM |
|
|
Thread: Combinator Attack and unique
Post: RE: Combinator Attack and unique
CPU, I would think.
Here's an alias that I stole from epixoip that works well on Linux:
Code:
--
bigsort() { LC_ALL=C sort --parallel=4 -S 4000M -T /path/to/fast/storage/ $*; }
--
A... |
|
royce |
hashcat
|
3 |
2,897 |
11-29-2017, 10:37 PM |
|
|
Thread: Descrypt 8 Char PW
Post: RE: Descrypt 8 Char PW
I couldn't immediately find any public benchmarks on 4.x hashcat for a 1060.
If you happen to have one, run that actual attack and check the time estimate; that will be the most accurate way to ge... |
|
royce |
General Talk
|
10 |
8,115 |
11-29-2017, 09:08 PM |
|
|
Thread: Passwords^13 - Bergen - December 2-3
Post: RE: Passwords^13 - Bergen - December 2-3
YouTube playlist of all videos from the conference are here (https://www.youtube.com/watch?v=DwbvFQx0Vfk&list=PLdIqs92nsIzQL6_ZTXTDPvhE7GiZrl-Em). |
|
royce |
Organisation and Events
|
2 |
10,974 |
11-29-2017, 06:03 AM |
|
|
Thread: 3des, k1==k3, k1 != k2 kernel
Post: RE: 3des, k1==k3, k1 != k2 kernel
As a general reference for other searchers:
* My understanding is that k1 != k2 != k3 is feasible because of meet-in-the-middle (https://crypto.stackexchange.com/questions/6345).
* See also this... |
|
royce |
hashcat
|
1 |
2,519 |
11-29-2017, 05:31 AM |
|
|
Thread: Sql server 2014 hashes
Post: RE: Sql server 2014 hashes
You mean something like this?
Code:
--
SELECT password_hash
FROM sys.sql_logins
--
More info here: https://www.sqlservercentral.com/articles/password+cracking/96540/ |
|
royce |
General Talk
|
1 |
3,132 |
11-29-2017, 05:23 AM |
|
|
Thread: [sha256] Hash inside a hash
Post: RE: [sha256] Hash inside a hash
If the first sha256 was based on a shorter, less random string, you're far better off attacking that, and then just running sha256 on it. :)
But if the first sha256 is of something large or random,... |
|
royce |
hashcat
|
5 |
3,758 |
11-29-2017, 02:49 AM |
|
|
Thread: [sha256] Hash inside a hash
Post: RE: [sha256] Hash inside a hash
If it's the case that it's sha256(sha256(pass)), trying to discover that original 'pass' string is much more efficient.
hashcat doesn't support that specific combo, but other tools (John the Ripper... |
|
royce |
hashcat
|
5 |
3,758 |
11-29-2017, 02:36 AM |
|
|
Thread: Quad 1080 ti Build | Need Hardware Advice
Post: RE: Quad 1080 ti Build | Need Hardware Advice
x16 throughput is not important for most hashcat attacks. x4 is the minimum from my testing, for both hashcat and john.
Having some RAM and CPU to feed the GPUs for some attacks is a good call. Dit... |
|
royce |
Hardware
|
3 |
4,053 |
11-29-2017, 12:42 AM |
|
|
Thread: Combinator Attack and unique
Post: RE: Combinator Attack and unique
The assumption is that the user will deduplicate, if desired. |
|
royce |
hashcat
|
3 |
2,897 |
11-29-2017, 12:27 AM |
|
|
Thread: LUKS benchmarks and estimated times
Post: RE: LUKS benchmarks and estimated times
Mode 14600 (LUKS) benches at around 10k H/s on a GTX 1080 with -w 4 and -O.
If you have literally no idea what those 10 characters might be ... it ain't happenin' any time soon. |
|
royce |
hashcat
|
2 |
3,486 |
11-27-2017, 04:59 AM |
|
|
Thread: bitcoin hash not started
Post: RE: bitcoin hash not started
According to the main hashcat webpage, this driver version is required:
AMD GPUs on Windows require "AMD Radeon Software Crimson Edition" (15.12 or later) |
|
royce |
hashcat
|
3 |
3,050 |
11-25-2017, 11:00 PM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
Yeah, the naming cat is probably already out of the bag.
I've clarified the FAQ section to make it very clear that hashcat --keyspace is specifically for distributing work, and does not directly co... |
|
royce |
hashcat
|
15 |
20,288 |
11-25-2017, 10:38 PM |
|
|
Thread: maskprocessor to output in HEX?
Post: RE: maskprocessor to output in HEX?
Not sure if this matches your use case, but FWIW, hops suggested this workaround:
Code:
--
$ ./mp64.bin -1 ?dabcdef '$HEX[?1?1]'
$HEX[00]
$HEX[01]
$HEX[02]
$HEX[03]
$HEX[04]
$HEX[05]
$HEX... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
5,357 |
11-25-2017, 10:34 PM |