Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
I encourage you to calculate how much of a difference in total keyspace this would make - and how long your attack will take even if these duplicates were removed.
Here is a value that might be hel... |
|
royce |
hashcat
|
6 |
4,323 |
04-22-2018, 07:51 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
Yep, that looks right to me. I need to upgrade napkins. :) |
|
royce |
hashcat
|
6 |
4,323 |
04-22-2018, 08:55 PM |
|
|
Thread: Cache path
Post: RE: Cache path
This message happens at a different stage from the dictionary metadata analysis. This message is related to the overall space needed to execute the attack. It is not clear from your question what kind... |
|
royce |
hashcat
|
2 |
2,038 |
04-22-2018, 09:42 PM |
|
|
Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...
Generally speaking, there's no efficient way to eliminate duplicates within hashcat itself. You'd have to write an external candidate-password generator, and pipe that into hashcat. |
|
royce |
hashcat
|
6 |
4,323 |
04-23-2018, 04:35 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
Regardless of attack, -m 0 is unsalted and -m 20 is salted. If this concept isn't familiar, search a bit for "password" and "salting". |
|
royce |
hashcat
|
16 |
9,677 |
04-25-2018, 07:28 AM |
|
|
Thread: HashCat takes a very long time to report progress
Post: RE: HashCat takes a very long time to report progr...
Have you tried manually setting the status update frequency (with --status and --status-timer)?
[Edit: apparently this issue is regardless of that; could be a potential feature, likely a GitHub iss... |
|
royce |
hashcat
|
5 |
8,314 |
04-26-2018, 06:59 AM |
|
|
Thread: please add PuTTY private key cracker ! thx
Post: RE: please add PuTTY private key cracker ! thx
Have you considered atom's suggestion above? |
|
royce |
hashcat
|
3 |
6,345 |
04-26-2018, 07:01 AM |
|
|
Thread: Can anyone help me
Post: RE: Can anyone help me
Usually, the only reason people try alternate OpenCL is because drivers from AMD/NVIDIA are not available.
If so, there's not a lot that hashcat can do for you - you should heed the disclaimers at ... |
|
royce |
hashcat
|
3 |
3,116 |
04-27-2018, 06:16 PM |
|
|
Thread: Veracrypt Kuznyechik(Serpent(Camellia))
Post: RE: Veracrypt Kuznyechik(Serpent(Camellia))
I don't believe this algorithm is current supported. You might consider requesting it on the hashcat GitHub. |
|
royce |
hashcat
|
2 |
2,629 |
04-30-2018, 05:09 PM |
|
|
Thread: pass:hash output for every candidate
Post: RE: pass:hash output for every candidate
I'm not aware of a way to get hashcat to output *all* candidates - only the actual cracks.
What is your use case for this? |
|
royce |
hashcat
|
5 |
3,431 |
05-02-2018, 04:08 AM |
|
|
Thread: pocl benchmarks
Post: RE: pocl benchmarks
Wow - that is quite interesting - thanks for the stats, hops. Promising for the future - and useful even today for people with specific attack needs. |
|
royce |
hashcat
|
1 |
2,405 |
05-02-2018, 04:36 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
Looks like this is the same as:
https://github.com/magnumripper/JohnTheRipper/pull/3240
... so John the Ripper (jumbo edition) may have it soon? |
|
royce |
hashcat
|
5 |
5,005 |
05-02-2018, 06:16 PM |
|
|
Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem
Yeah, it's a normal and understandable intuition. But by design, only trying to hash the entire string will generate a hash that is then compared to the target hash. Once you understand how hashing wo... |
|
royce |
hashcat
|
3 |
2,661 |
05-06-2018, 09:55 PM |
|
|
Thread: HashCat takes a very long time to report progress
Post: RE: HashCat takes a very long time to report progr...
I wouldn't say by design - but I have no idea if this longer delay is "fixable" or a natural consequence of the approach. My understanding is that there's some development discussion going on about it... |
|
royce |
hashcat
|
5 |
8,314 |
05-06-2018, 09:56 PM |
|
|
Thread: Cooling
Post: RE: Cooling
It sounds like you need to improve airflow in the case, or move the system to a cooler room (or both). Running cards hot is a gamble, and I'd concentrate on getting the cooling resolved rather than gu... |
|
royce |
hashcat
|
10 |
7,557 |
05-09-2018, 04:36 PM |
|
|
Thread: pass:hash output for every candidate
Post: RE: pass:hash output for every candidate
Hmm. If hashcat creates different hashes for the same candidates (assuming the same salt), that would be a pretty serious bug.
Generally speaking, you might be able to figure something out using ha... |
|
royce |
hashcat
|
5 |
3,431 |
05-10-2018, 03:34 PM |
|
|
Thread: Solution to use very large wordlist
Post: RE: Solution to use very large wordlist
Discussion of speed needs to know what type of hash is the target. Either:
A) your attack is malformed (can you post your syntax, omitting any real hashes?), or
b) it's a pretty fast hash and y... |
|
royce |
hashcat
|
4 |
3,817 |
05-12-2018, 03:53 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
cryptozin, please don't hijack threads. If you have a different question, please start a new thread. |
|
royce |
hashcat
|
16 |
9,777 |
05-12-2018, 03:56 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
Not much to go on to help you here.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a... |
|
royce |
hashcat
|
16 |
9,777 |
05-13-2018, 04:00 AM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: [ANSWERED] New user, custom brute force help
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore. |
|
royce |
hashcat
|
16 |
9,777 |
05-14-2018, 12:59 AM |