Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
Yep, the GitHub repo says that it's as simple as that. |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 02:43 AM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
Looking at the Makefile, it looks pretty vanilla - I see OpenSSL (which most Linux systems will have). If you encounter an error, post and we'll tackle it together. :) |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 03:06 AM |
|
|
Thread: Help me install hxctools
Post: RE: Help me install hxctools
Well, you could ask in this thread:
https://hashcat.net/forum/thread-6661.html |
|
royce |
hashcat
|
3 |
1,607 |
08-26-2019, 03:37 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
Huh, I didn't know this. Not sure what is the best way to express this in the --help output, but it feels important enough to try. |
|
royce |
hashcat
|
8 |
3,443 |
08-26-2019, 03:38 PM |
|
|
Thread: Rule Question
Post: RE: Rule Question
Fair question.
If the rule file contains the "do nothing" rule directive ( : - just a colon by itself), then the original unmodified input words will be used. |
|
royce |
hashcat
|
3 |
1,245 |
08-26-2019, 03:50 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
Hello! Please post in English. Use Google Translate if you need to.
Here is a Google Translate translation of the above:
I am learning hashcat, but its instructions make me a headache. I searched a ... |
|
royce |
hashcat
|
4 |
1,879 |
09-01-2019, 07:06 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
https://www.google.com/search?q=hashcat+%28novice+OR+beginner%29+%28tutorial+OR+howto%29
... yields:
https://laconicwolf.com/2018/09/29/hashcat-tutorial-the-basics-of-cracking-passwords-with-has... |
|
royce |
hashcat
|
4 |
1,879 |
09-02-2019, 04:37 PM |
|
|
Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...
And if it needs to be more than two words wide, you can do something crude like this:
https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2 |
|
royce |
hashcat
|
3 |
1,428 |
09-04-2019, 02:41 PM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
So you know the base word, and you need to append some a special and two numbers?
-r ./rules/hybrid/append_s.rule -r ./rules/hybrid/append_d.rule -r -r ./rules/hybrid/append_d.rule |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 02:09 AM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
Because masks are executed on GPU, it's probably much faster to just run it as a hybrid (-a 6) or mask attack. |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 03:43 AM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified.
It defaults to this mask:
-1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 06:42 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max. |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 06:50 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
No utility necessary - honest. :D Study the default, understand how it works, and then adapt it to your needs. :D |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 07:15 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
Yes - the one I first posted. ;)
Study how custom character set works, and replace sequences like this:
?l?l?l?l?l?l?l?l
?u?l?l?l?l?l?l?l
?d?l?l?l?l?l?l?l
... with:
-1 ?l?u?d ?1?l?l?l?l?... |
|
royce |
hashcat
|
11 |
2,908 |
09-22-2019, 06:40 PM |
|
|
Thread: unknown hash type
Post: RE: unknown hash type
https://hashcat.net/forum/archive/index.php?announcement-2.html |
|
royce |
hashcat
|
2 |
1,064 |
09-25-2019, 03:42 AM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
I honestly haven't tried this before, but instead of trying to load it all into a mask, you might also be able to just do a hybrid attack (mask + wordlist), where the wordlist is just one line with yo... |
|
royce |
hashcat
|
6 |
2,042 |
10-09-2019, 06:06 PM |
|
|
Thread: Graphic card or cloud computing
Post: RE: Graphic card or cloud computing
This depends on your use case.
If you have a one-time cracking job that will only take a few hours or days, then the cloud makes more sense.
If you intend to have longer-running jobs, or multipl... |
|
royce |
hashcat
|
3 |
1,505 |
10-11-2019, 07:34 AM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
Fair question. So far, I don't think that any interface-breaking changes have happened, so no migration steps have been necessary.
If/when it becomes necessary, the migration will vary, based on wh... |
|
royce |
hashcat
|
8 |
2,472 |
10-12-2019, 08:44 AM |
|
|
Thread: My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o
Post: RE: My amd gpu hashcat -b -m 17200 can't get the b...
Thanks for masking the hash!
Could you provide the full commandline you're using, and the output that you get (continuing to mask any hashes)? |
|
royce |
hashcat
|
2 |
1,345 |
10-21-2019, 04:18 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Do you mean that the plaintext is 32 characters?
If so, then unless you have a strong idea of its composition, bruteforce cannot reach even half of that keyspace. |
|
royce |
hashcat
|
4 |
1,655 |
10-21-2019, 06:20 AM |