Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Multiple masks - repeated sequences
Post: RE: Multiple masks - repeated sequences
Do the math of how many combinations it will actually save you, compared to the total number of combinations.
It's rarely worth the effort to eliminate the relatively small number of duplicates lik... |
|
royce |
hashcat
|
2 |
625 |
05-19-2020, 10:01 PM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit:
https://github.com/iphelix/pack/... |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 04:04 AM |
|
|
Thread: Apply Rule In Between Dictionary Words
Post: RE: Apply Rule In Between Dictionary Words
You have a couple of indirect options:
1. Generate the .###. list externally with a script, and then use combinator3 to pipe that combined with your other wordlists hashcat. That will be OK for slo... |
|
royce |
hashcat
|
1 |
485 |
05-15-2020, 05:36 AM |
|
|
Thread: Brute-Force custom character
Post: RE: Brute-Force custom character
Following up from your other deleted post, in which you said there are exactly 8 upper and 5 digits.
There are probably too many combinations to reasonably exhaust, but to model how many masks woul... |
|
royce |
hashcat
|
2 |
792 |
05-20-2020, 04:07 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
Yep. That's what will take 49 years. :) |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 10:35 AM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
WFM:
Code:
--
$ hashcat --version
v5.1.0-1789-gc7da6357
$ file rockyou.txt.gz
rockyou.txt.gz: gzip compressed data, was "rockyou.txt", last modified: Thu Jul 7 14:27:39 2016, from Unix
$ wc -l r... |
|
royce |
hashcat
|
6 |
1,379 |
05-23-2020, 07:31 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
I'm not sure, but I think that decompressed data can be used "on the fly" - as soon as it's decompressed, without having to wait for the entire file to decompress. |
|
royce |
hashcat
|
6 |
1,379 |
05-24-2020, 03:48 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Yes, that seems right. It would have to decompress the whole thing first, enough to analyze the statistics and then cache them. so I assume there would be some duplicated work, just like dictionary ca... |
|
royce |
hashcat
|
6 |
1,379 |
05-25-2020, 10:28 PM |
|
|
Thread: Make a word list with hashcat
Post: RE: Make a word list with hashcat
To clarify, do you mean that each word is 62 characters long, and only consisting of the letters '1', '3', 'e', and 'f' ?
If so, this wordlist would be infeasible to exhaust.
https://www.wolfram... |
|
royce |
hashcat
|
3 |
910 |
05-26-2020, 04:29 PM |
|
|
Thread: Missing characters from hashcat brute-force?
Post: RE: Missing characters from hashcat brute-force?
Yes, the default incremental mode is not a full brute force, but rather one that is optimized for likely candidates without being exhaustive:
Guess.Mask.......: ?1?2?2?2?2?2?2?3 [8]
Guess.Charset.... |
|
royce |
hashcat
|
2 |
705 |
05-26-2020, 08:16 PM |
|
|
Thread: Improved Mask Attack
Post: RE: Improved Mask Attack
Look at the custom character set parameters (-1 / -2 / -3 / -4) |
|
royce |
hashcat
|
2 |
705 |
05-28-2020, 11:42 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
There's no online calculator that I'm aware of.
Just do the math:
1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450... |
|
royce |
hashcat
|
6 |
1,263 |
05-29-2020, 05:50 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
Because of the definition of ?a, as shown in hashcat --help:
Code:
--
- [ Built-in Charsets ] -
? | Charset
===+=========
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWX... |
|
royce |
hashcat
|
6 |
1,263 |
05-29-2020, 08:30 PM |
|
|
Thread: Hashcat don't use my GPU or my GPU are bottleneck
Post: RE: Hashcat don't use my GPU or my GPU are bottlen...
Wordlist-only attacks (without additional work like rules or hybrid masks) cannot reach full benchmark speeds, because not enough work (candidate words) can be supplied to keep up with the speed of th... |
|
royce |
hashcat
|
2 |
735 |
06-05-2020, 03:56 AM |
|
|
Thread: Make a word list with hashcat
Post: RE: Make a word list with hashcat
It is not possible with 100,000 graphics cards. I encourage you to do the mathematical calculation yourself:
- Test how many hashes per second are possible on your system
- Calculate how many poss... |
|
royce |
hashcat
|
3 |
910 |
05-26-2020, 08:45 PM |
|
|
Thread: how to use algo new
Post: RE: how to use algo new
If you mean one of these, hashcat supports it:
* MySQL5 - hashcat mode -m 300
* sha1(sha1(pass)) - hashcat mode -m 4500 |
|
royce |
hashcat
|
1 |
610 |
06-05-2020, 03:34 PM |
|
|
Thread: htacces crack
Post: RE: htacces crack
I've redacted your hash. Please read the forum rules:
https://hashcat.net/forum/archive/index.php?announcement-2.html
To identify hashes, check against the hashcat example hashes:
https://has... |
|
royce |
hashcat
|
1 |
466 |
06-14-2020, 07:04 PM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
Could you elaborate with a hypothetical/contrived example?
It sounds like you *might* be looking for masks. For example, if you know that a password is 10 characters and the first four characters a... |
|
royce |
hashcat
|
11 |
1,633 |
06-14-2020, 10:36 PM |
|
|
Thread: hashcat -b is not seeing my grahpic card
Post: RE: hashcat -b is not seeing my grahpic card
FWIW, under Ubuntu 18.04 I'm also able to run hashcat well using the native packages. I have these installed:
Code:
--
$ dpkg -l | grep nvidia | egrep -v '^ii' | cut -b1-80
rcĀ libnvidia-compu... |
|
royce |
hashcat
|
4 |
892 |
06-15-2020, 05:21 PM |
|
|
Thread: Modify the hash file and continue the attack at the same point
Post: RE: Modify the hash file and continue the attack a...
I'm not aware of a way to do this.
But wouldn't this mean that all of your previous attack wouldn't ever be applied to the new hash? |
|
royce |
hashcat
|
3 |
662 |
06-22-2020, 08:31 PM |