Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: About --keep-guessing
Post: RE: About --keep-guessing
Almost not at all. I guess it would alter the behavior for any hashes that already keep guessing (is it 7-Zip?) |
|
royce |
Beta Tester
|
7 |
10,828 |
11-27-2016, 01:45 AM |
|
|
Thread: compiling makefile github
Post: RE: compiling makefile github
https://github.com/hashcat/hashcat/blob/master/BUILD.md |
|
royce |
Beta Tester
|
8 |
13,135 |
05-08-2017, 10:25 PM |
|
|
Thread: compiling makefile github
Post: RE: compiling makefile github
Briefly:
* Don't use The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali). Use a direct OS install.
* Don't use aircrack-ng. Get the caps with https://github.com/ZerBea/hcxtools (or better ... |
|
royce |
Beta Tester
|
8 |
13,135 |
05-08-2017, 11:55 PM |
|
|
Thread: About --keep-guessing
Post: RE: About --keep-guessing
I've requested the --no-keep-guessing flag here:
https://github.com/hashcat/hashcat/issues/1795 |
|
royce |
Beta Tester
|
7 |
10,828 |
11-24-2018, 09:32 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
Wow, this is going to be a game-changer!
If feasible, one UX request: Please do what JtR does here and warn the user about any "calculatable" efficiency thresholds into this new mode. For example, a ... |
|
royce |
Beta Tester
|
21 |
3,761 |
09-29-2020, 05:03 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
"Association" is a general term here that allows attacks to be targets *on a per-hash basis*.
In other words, you don't have to try each word against each hash. Instead, you can try just one word ag... |
|
royce |
Beta Tester
|
21 |
3,761 |
10-01-2020, 05:20 PM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
atom Wrote: (09-30-2020, 12:11 PM)
--
Code:
--
The wordlist or mask that you are using is too small.
This means that hashcat cannot use the full parallel power of your device(s).
Unless you supp... |
|
royce |
Beta Tester
|
21 |
3,761 |
09-30-2020, 05:57 PM |
|
|
Thread: PACK-0.0.4
Post: RE: PACK-0.0.4
How far into the analysis was it when you posted these stats?
It's a pretty intense analysis. I am currently processing a 1.3GB wordlist (154,094,601 words), and it's running at roughly 2500 p/s... |
|
royce |
General Help
|
2 |
5,824 |
01-30-2015, 09:24 AM |
|
|
Thread: Tridition DES supported ???
Post: RE: Tridition DES supported ???
Hi, oscam. Last I'd heard (2012), key-based DES is not supported.
The hash type 1500 - "descrypt, DES(Unix), Traditional DES" - is not keyed DES encryption. It's a format used to hash passwords o... |
|
royce |
General Help
|
3 |
5,654 |
03-07-2015, 06:43 PM |
|
|
Thread: Cisco IOS MD5 BruteForce Mask
Post: RE: Cisco IOS MD5 BruteForce Mask
Assuming that it's this type of hash:
Code:
--
$ openssl passwd -1 -salt 0000 -table password
password $1$0000$aWwcZQIpZ/gD70N/fOUeh0
--
... then you need to specify the hash type (-m 500 = Cisco-... |
|
royce |
General Help
|
8 |
29,652 |
04-14-2015, 05:32 PM |
|
|
Thread: Cisco IOS MD5 BruteForce Mask
Post: RE: Cisco IOS MD5 BruteForce Mask
This looks normal. Brute force automatically starts with short masks and then moves on to longer ones. While it's moving through the short masks, they're too short to really make the GPUs work hard, ... |
|
royce |
General Help
|
8 |
29,652 |
04-14-2015, 08:44 PM |
|
|
Thread: office excel 2010 hash
Post: RE: office excel 2010 hash
What command lines have you tried, and what errors were geenrtaed? |
|
royce |
General Help
|
8 |
12,519 |
04-14-2015, 08:54 PM |
|
|
Thread: Cracking descrypt
Post: RE: Cracking descrypt
Here's one for ZTEX -- source code, but no bitstream.
https://github.com/Gifts/descrypt-ztex-bruteforcer |
|
royce |
General Help
|
3 |
7,715 |
11-08-2015, 08:54 AM |
|
|
Thread: What I'm doing wrong?
Post: RE: What I'm doing wrong?
Please post your command syntax for a sanity check. |
|
royce |
General Help
|
8 |
11,369 |
11-12-2015, 03:51 AM |
|
|
Thread: Bitslice status and broken nvcc
Post: RE: Bitslice status and broken nvcc
Can the source be reduced to a minimal test case, suitable for sharing with the nvcc team? |
|
royce |
General Talk
|
16 |
25,328 |
10-25-2015, 07:40 AM |
|
|
Thread: edit session settings?
Post: RE: edit session settings?
philsmd's tool here may help:
https://github.com/philsmd/analyze_hc_restore |
|
royce |
General Talk
|
5 |
5,904 |
07-03-2016, 11:19 PM |
|
|
Thread: How I can make a more efficient bruteforce attack?
Post: RE: How I can make a more efficient bruteforce att...
Take a look at
https://hashcat.net/wiki/doku.php?id=rule_based_attack
The 'd' rule function repeats a word. |
|
royce |
General Talk
|
1 |
3,237 |
08-02-2016, 03:02 PM |
|
|
Thread: Dictionary encoding: UTF8 or Win-1252 for German?
Post: RE: Dictionary encoding: UTF8 or Win-1252 for Germ...
Dictionary encoding depends on the encoding used by the software that initially stored the passwords. If the software used UTF-8, hashcat will need to receive UTF-8 strings as source material. If anot... |
|
royce |
General Talk
|
2 |
4,022 |
08-21-2016, 08:49 AM |
|
|
Thread: Notifications from forum are going to SPAM folder
Post: RE: Notifications from forum are going to SPAM fol...
Assuming that the stated host is the only source, something along these lines would be a starting point:
Code:
--
IN TXT "v=spf1 ip6:2a03:f80:ed15:149:154:152:149:1 ~all"
--
|
|
royce |
General Talk
|
4 |
7,257 |
08-28-2016, 12:51 AM |
|
|
Thread: md5(md5($pass)$salt) for hash code 1$
Post: RE: md5(md5($pass)$salt) for hash code 1$
You're mean, radix. 1$ [sic] seemed like a pretty competitive offer to me. ;) |
|
royce |
General Talk
|
2 |
4,189 |
09-11-2016, 05:33 AM |