Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: RTX 2080 Low performance
Post: RE: RTX 2080 Low performance
The kernel building is a once-per-algorithm-per-hashcat-version thing, and will only slow you down on the first run. |
|
royce |
hashcat
|
7 |
3,930 |
04-08-2019, 10:14 PM |
|
|
Thread: Where's potfile?
Post: RE: Where's potfile?
|
royce |
hashcat
|
7 |
2,992 |
04-10-2019, 04:51 PM |
|
|
Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt
There's no way to suppress these errors with a hashcat flag. --force certainly doesn't do that. |
|
royce |
hashcat
|
5 |
2,706 |
05-01-2019, 06:04 PM |
|
|
Thread: Alternatives to HashcatGUI?
Post: RE: Alternatives to HashcatGUI?
|
royce |
hashcat
|
4 |
1,994 |
07-06-2019, 08:31 PM |
|
|
Thread: Host memory required for this attack: 64 MB
Post: RE: Host memory required for this attack: 64 MB
Did the attack work?
I think it's informative - not an error? |
|
royce |
hashcat
|
1 |
1,191 |
07-16-2019, 04:01 PM |
|
|
Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking
If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time.
If you do the math:
https://www.wolframalpha.com/input/?i=(26%2B26%2B34)... |
|
royce |
hashcat
|
5 |
3,976 |
08-04-2019, 08:12 PM |
|
|
Thread: Password cracking guidance
Post: RE: Password cracking guidance
The magic word you're missing is "LUKS".
This should yield a few reasonable howtos:
https://www.google.com/search?q=LUKS+hashcat |
|
royce |
hashcat
|
1 |
1,241 |
08-06-2019, 05:05 AM |
|
|
Thread: I'm using Windows - where does combinator.exe write out to?
Post: RE: I'm using Windows - where does combinator.exe ...
The canonical way to do this is simply pipe the output of combinator to hashcat itself, so you don't have to store the result anywhere.
combinator list1 list2 | hashcat ... |
|
royce |
hashcat
|
2 |
1,064 |
08-14-2019, 02:35 AM |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
Example method - script by atom.
Code:
--
#!/usr/bin/perl
use strict;
use warnings;
use MIME::Base64;
while (my $line = )
{
chomp $line;
my @data = split '\$', $line;
if ($data[5] ne 64)
... |
|
royce |
hashcat
|
2 |
1,189 |
08-14-2019, 04:15 PM |
|
|
Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...
There's no single mask. You have to generate a *list of masks*.
You can do this with policygen from the PACK toolkit.
https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-... |
|
royce |
hashcat
|
2 |
1,220 |
08-18-2019, 06:24 PM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
There's no install - you just download it by whatever means you can, and then transfer it to where you need to run it, and then compile+run. |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 02:28 AM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
Yep, the GitHub repo says that it's as simple as that. |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 02:43 AM |
|
|
Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?
Looking at the Makefile, it looks pretty vanilla - I see OpenSSL (which most Linux systems will have). If you encounter an error, post and we'll tackle it together. :) |
|
royce |
hashcat
|
7 |
2,463 |
08-25-2019, 03:06 AM |
|
|
Thread: Help me install hxctools
Post: RE: Help me install hxctools
Well, you could ask in this thread:
https://hashcat.net/forum/thread-6661.html |
|
royce |
hashcat
|
3 |
1,608 |
08-26-2019, 03:37 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
Huh, I didn't know this. Not sure what is the best way to express this in the --help output, but it feels important enough to try. |
|
royce |
hashcat
|
8 |
3,443 |
08-26-2019, 03:38 PM |
|
|
Thread: Rule Question
Post: RE: Rule Question
Fair question.
If the rule file contains the "do nothing" rule directive ( : - just a colon by itself), then the original unmodified input words will be used. |
|
royce |
hashcat
|
3 |
1,245 |
08-26-2019, 03:50 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
Hello! Please post in English. Use Google Translate if you need to.
Here is a Google Translate translation of the above:
I am learning hashcat, but its instructions make me a headache. I searched a ... |
|
royce |
hashcat
|
4 |
1,879 |
09-01-2019, 07:06 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
https://www.google.com/search?q=hashcat+%28novice+OR+beginner%29+%28tutorial+OR+howto%29
... yields:
https://laconicwolf.com/2018/09/29/hashcat-tutorial-the-basics-of-cracking-passwords-with-has... |
|
royce |
hashcat
|
4 |
1,879 |
09-02-2019, 04:37 PM |
|
|
Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...
And if it needs to be more than two words wide, you can do something crude like this:
https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2 |
|
royce |
hashcat
|
3 |
1,429 |
09-04-2019, 02:41 PM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
So you know the base word, and you need to append some a special and two numbers?
-r ./rules/hybrid/append_s.rule -r ./rules/hybrid/append_d.rule -r -r ./rules/hybrid/append_d.rule |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 02:09 AM |