Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Veracrypt with keyfile
Post: RE: Veracrypt with keyfile
Sounds like it's a passphrase, and you know the wordlist, but not the order.
princeprocessor could be used to generate all possible combinations of words. You may need to alter princeprocessor's so... |
|
royce |
hashcat
|
2 |
1,630 |
02-25-2019, 07:20 PM |
|
|
Thread: Wordlist massive attack
Post: RE: Wordlist massive attack
You can assemble the passphrases from a one-word-per-line wordlist, using princeprocessor, and then pipe it to hashcat, using one of the prince_*.rule rules files to supply more work to the GPUs. |
|
royce |
hashcat
|
3 |
2,583 |
03-01-2019, 07:14 AM |
|
|
Thread: Can I use Hashcat for checking against HIBP DB?
Post: RE: Can I use Hashcat for checking against HIBP DB...
Well, theoretically, you could download the HIBP SHA-1 hashes from https://haveibeenpwned.com/Passwords, and then crack them with hashcat using your list as a wordlist. But since the HIBP list is so l... |
|
royce |
hashcat
|
4 |
3,071 |
03-10-2019, 06:30 PM |
|
|
Thread: iClass request
Post: RE: iClass request
https://www.cs.bham.ac.uk/~garciaf/publications/dismantling.iClass.pdf |
|
royce |
hashcat
|
4 |
2,577 |
03-16-2019, 01:38 AM |
|
|
Thread: Separator unmatched when using example hash
Post: RE: Separator unmatched when using example hash
Hashes containing '$' need to be enclosed in single quotes on the Unix commandline. This is because $[string] is a way to do variable substitution in bash and related shells.
Once you fix that, you ... |
|
royce |
hashcat
|
2 |
8,713 |
03-16-2019, 08:10 PM |
|
|
Thread: hashcat do not work android linux ?
Post: RE: hashcat do not work android linux ?
There appears to be no OpenCL on this platform. OpenCL is required. |
|
royce |
hashcat
|
2 |
1,739 |
03-31-2019, 05:10 PM |
|
|
Thread: Help with specific password scheme
Post: RE: Help with specific password scheme
A hybrid attack might be fine. If you generate the wordlist on the fly, no need to store it anywhere. I'd do it with everything but the first four digits prepended and then pipe the output of that scr... |
|
royce |
hashcat
|
3 |
1,591 |
04-01-2019, 04:48 PM |
|
|
Thread: Help with specific password scheme
Post: RE: Help with specific password scheme
The rules would probably have to stop there, because the number of combinations would probably go up pretty quickly - adding three specials to the previous calculation would be 600K rules x (35^3) wou... |
|
royce |
hashcat
|
3 |
1,591 |
04-02-2019, 04:06 AM |
|
|
Thread: Hashcat self-destructs (Windows)
Post: RE: Hashcat self-destructs (Windows)
Ah, so it was previously running, and then it got overwritten somehow?
My first instinct is to say that it's almost certainly due to either a non-hashcat-supplied script with a bug in it, or some o... |
|
royce |
hashcat
|
2 |
1,561 |
04-06-2019, 05:09 PM |
|
|
Thread: RTX 2080 Low performance
Post: RE: RTX 2080 Low performance
The kernel building is a once-per-algorithm-per-hashcat-version thing, and will only slow you down on the first run. |
|
royce |
hashcat
|
7 |
3,929 |
04-08-2019, 10:14 PM |
|
|
Thread: Where's potfile?
Post: RE: Where's potfile?
|
royce |
hashcat
|
7 |
2,992 |
04-10-2019, 04:51 PM |
|
|
Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt
There's no way to suppress these errors with a hashcat flag. --force certainly doesn't do that. |
|
royce |
hashcat
|
5 |
2,706 |
05-01-2019, 06:04 PM |
|
|
Thread: Alternatives to HashcatGUI?
Post: RE: Alternatives to HashcatGUI?
|
royce |
hashcat
|
4 |
1,994 |
07-06-2019, 08:31 PM |
|
|
Thread: Host memory required for this attack: 64 MB
Post: RE: Host memory required for this attack: 64 MB
Did the attack work?
I think it's informative - not an error? |
|
royce |
hashcat
|
1 |
1,191 |
07-16-2019, 04:01 PM |
|
|
Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking
If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time.
If you do the math:
https://www.wolframalpha.com/input/?i=(26%2B26%2B34)... |
|
royce |
hashcat
|
5 |
3,976 |
08-04-2019, 08:12 PM |
|
|
Thread: Password cracking guidance
Post: RE: Password cracking guidance
The magic word you're missing is "LUKS".
This should yield a few reasonable howtos:
https://www.google.com/search?q=LUKS+hashcat |
|
royce |
hashcat
|
1 |
1,241 |
08-06-2019, 05:05 AM |
|
|
Thread: I'm using Windows - where does combinator.exe write out to?
Post: RE: I'm using Windows - where does combinator.exe ...
The canonical way to do this is simply pipe the output of combinator to hashcat itself, so you don't have to store the result anywhere.
combinator list1 list2 | hashcat ... |
|
royce |
hashcat
|
2 |
1,064 |
08-14-2019, 02:35 AM |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
Example method - script by atom.
Code:
--
#!/usr/bin/perl
use strict;
use warnings;
use MIME::Base64;
while (my $line = )
{
chomp $line;
my @data = split '\$', $line;
if ($data[5] ne 64)
... |
|
royce |
hashcat
|
2 |
1,189 |
08-14-2019, 04:15 PM |
|
|
Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...
There's no single mask. You have to generate a *list of masks*.
You can do this with policygen from the PACK toolkit.
https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-... |
|
royce |
hashcat
|
2 |
1,220 |
08-18-2019, 06:24 PM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
There's no install - you just download it by whatever means you can, and then transfer it to where you need to run it, and then compile+run. |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 02:28 AM |