Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Known password construction
Post: RE: Known password construction
Unless you're dealing with a very slow hash, that level of processing would be a waste of time on GPU, especially when using rules. Filter it the best you can inbound, and then use rules to permute wh... |
|
royce |
hashcat
|
7 |
4,564 |
04-01-2018, 12:58 AM |
|
|
Thread: Newbee Question about Requirements(RESOLVED)
Post: RE: Newbee Question about Requirements
You need OpenCL. Download and install what the hashcat.net/hashcat/ page suggests for your platform. The reason why should be easily Google-able, but in a nutshell, it's a unified language for writing... |
|
royce |
hashcat
|
2 |
2,302 |
04-05-2018, 06:06 AM |
|
|
Thread: Two sessions writing to the same potfile
Post: RE: Two sessions writing to the same potfile
Use the source, Luke. :)
If you look at locking.c and potfile.c in the source code, it appears that (as long as you're not on Windows), some basic locking of the potfile is happening.
That being... |
|
royce |
hashcat
|
6 |
4,965 |
04-07-2018, 05:26 AM |
|
|
Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!
That format has more fields, separated by asterisks, than your hash.
If you try your attack against this example hash from hashcat wiki has more fields:
$itunes_backup$*10*8b715f516ff8e64442c478... |
|
royce |
hashcat
|
3 |
11,612 |
04-13-2018, 04:48 PM |
|
|
Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!
Does your attack work against the example hash? If so, the problem is probably your hash. Double-check to ensure that the field count is identical. |
|
royce |
hashcat
|
3 |
11,612 |
04-14-2018, 05:13 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Do a little more research into how to make images that compress well. It's quite feasible to make images that are very small. This avatar is only 3K:
https://gravatar.com/avatar/f720786ef4b2ff5b4b... |
|
royce |
hashcat
|
18 |
12,096 |
04-14-2018, 04:15 PM |
|
|
Thread: MD5 With salt how to save only cracked hash with email etc
Post: RE: MD5 With salt how to save only cracked hash wi...
Scripting. There's no canned way to do this. You could group your other data into an overloaded username field, and then use --username. |
|
royce |
hashcat
|
4 |
3,079 |
04-14-2018, 06:47 PM |
|
|
Thread: Hashcat & OpenCL... Why OpenCL?
Post: RE: Hashcat & OpenCL... Why OpenCL?
OpenCL is the framework that hashcat uses to perform the computation on the selected hardware.
Without an OpenCL driver for a given hardware platform, you cannot use modern hashcat on that hardware... |
|
royce |
hashcat
|
2 |
2,373 |
04-21-2018, 07:19 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
[heh, yeah - what philsmd said. :) ]
Are you getting an error, by any chance?
I think if you use --hex-charset, hashcat expects the other literals in the mask to either also be hex or else to be ... |
|
royce |
hashcat
|
16 |
9,677 |
04-22-2018, 07:34 AM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
I encourage you to calculate how much of a difference in total keyspace this would make - and how long your attack will take even if these duplicates were removed.
Here is a value that might be hel... |
|
royce |
hashcat
|
6 |
4,323 |
04-22-2018, 07:51 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
Yep, that looks right to me. I need to upgrade napkins. :) |
|
royce |
hashcat
|
6 |
4,323 |
04-22-2018, 08:55 PM |
|
|
Thread: Cache path
Post: RE: Cache path
This message happens at a different stage from the dictionary metadata analysis. This message is related to the overall space needed to execute the attack. It is not clear from your question what kind... |
|
royce |
hashcat
|
2 |
2,038 |
04-22-2018, 09:42 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
Generally speaking, there's no efficient way to eliminate duplicates within hashcat itself. You'd have to write an external candidate-password generator, and pipe that into hashcat. |
|
royce |
hashcat
|
6 |
4,323 |
04-23-2018, 04:35 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
Regardless of attack, -m 0 is unsalted and -m 20 is salted. If this concept isn't familiar, search a bit for "password" and "salting". |
|
royce |
hashcat
|
16 |
9,677 |
04-25-2018, 07:28 AM |
|
|
Thread: HashCat takes a very long time to report progress
Post: RE: HashCat takes a very long time to report progr...
Have you tried manually setting the status update frequency (with --status and --status-timer)?
[Edit: apparently this issue is regardless of that; could be a potential feature, likely a GitHub iss... |
|
royce |
hashcat
|
5 |
8,314 |
04-26-2018, 06:59 AM |
|
|
Thread: please add PuTTY private key cracker ! thx
Post: RE: please add PuTTY private key cracker ! thx
Have you considered atom's suggestion above? |
|
royce |
hashcat
|
3 |
6,345 |
04-26-2018, 07:01 AM |
|
|
Thread: Can anyone help me
Post: RE: Can anyone help me
Usually, the only reason people try alternate OpenCL is because drivers from AMD/NVIDIA are not available.
If so, there's not a lot that hashcat can do for you - you should heed the disclaimers at ... |
|
royce |
hashcat
|
3 |
3,116 |
04-27-2018, 06:16 PM |
|
|
Thread: Veracrypt Kuznyechik(Serpent(Camellia))
Post: RE: Veracrypt Kuznyechik(Serpent(Camellia))
I don't believe this algorithm is current supported. You might consider requesting it on the hashcat GitHub. |
|
royce |
hashcat
|
2 |
2,629 |
04-30-2018, 05:09 PM |
|
|
Thread: pass:hash output for every candidate
Post: RE: pass:hash output for every candidate
I'm not aware of a way to get hashcat to output *all* candidates - only the actual cracks.
What is your use case for this? |
|
royce |
hashcat
|
5 |
3,431 |
05-02-2018, 04:08 AM |
|
|
Thread: pocl benchmarks
Post: RE: pocl benchmarks
Wow - that is quite interesting - thanks for the stats, hops. Promising for the future - and useful even today for people with specific attack needs. |
|
royce |
hashcat
|
1 |
2,405 |
05-02-2018, 04:36 PM |