Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: My private dictionary from hundreds of sources
Post: RE: My private dictionary from hundreds of sources
First, thanks for thinking to contribute!
I don't want to rain on your parade ... but wordlists without attribution can sometimes be problematic. Everyone goes through this phase. ;)
Code:
--
$ wc... |
|
royce |
User Contributions
|
2 |
2,829 |
08-19-2019, 04:40 AM |
|
|
Thread: Unknown Hashes
Post: RE: Unknown Hashes
https://hashcat.net/forum/archive/index.php?announcement-2.html |
|
royce |
General Talk
|
2 |
11,344 |
09-22-2019, 07:34 AM |
|
|
Thread: unknown hash type
Post: RE: unknown hash type
https://hashcat.net/forum/archive/index.php?announcement-2.html |
|
royce |
hashcat
|
2 |
1,064 |
09-25-2019, 03:42 AM |
|
|
Thread: My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o
Post: RE: My amd gpu hashcat -b -m 17200 can't get the b...
Thanks for masking the hash!
Could you provide the full commandline you're using, and the output that you get (continuing to mask any hashes)? |
|
royce |
hashcat
|
2 |
1,345 |
10-21-2019, 04:18 AM |
|
|
Thread: newbie question - rejected passwords stay at zero
Post: RE: newbie question - rejected passwords stay at z...
Password candidates are only rejected when they're not applicable - for example, if the minimum password length supported by the password hash format is 8, and candidates less than 8 are being attempt... |
|
royce |
hashcat
|
2 |
960 |
10-29-2019, 06:06 AM |
|
|
Thread: Juniper netscreen hash help
Post: RE: Juniper netscreen hash help
does the attack work against the Netscreen example hash from the hashcat wiki (https://hashcat.net/wiki/doku.php?id=example_hashes)?
nNxKL2rOEkbBc9BFLsVGG6OtOUO/8n:user |
|
royce |
hashcat
|
2 |
1,126 |
12-11-2019, 06:15 AM |
|
|
Thread: Noob question: md5 salted unix unknown password cracking
Post: RE: Noob question: md5 salted unix unknown passwor...
Per the forum rules:
https://hashcat.net/forum/archive/index.php?announcement-2.html
... do not post hashes. I've redacted yours. |
|
royce |
hashcat
|
2 |
1,078 |
12-21-2019, 01:52 AM |
|
|
Thread: SHA256 (AuthMe)
Post: RE: SHA256 (AuthMe)
This type is present in the beta version, not yet released.
https://hashcat.net/beta/
Or you can wait until the release. |
|
royce |
hashcat
|
2 |
1,085 |
01-25-2020, 07:35 PM |
|
|
Thread: help finding installed hashcat potfile
Post: RE: help finding installed hashcat potfile
On Unix-likes, it's in a .hashcat directory in the user's home directory. Not sure if this is also true for macOS. |
|
royce |
hashcat
|
2 |
823 |
01-28-2020, 07:00 AM |
|
|
Thread: is sorting wordlist by length needed?
Post: RE: is sorting wordlist by length needed?
This is no longer necessary in modern hashcat. I've added a note to the end of that paragraph to make that explicit. Thanks for the indirect docs-bug report, always appreciated. :D |
|
royce |
hashcat
|
2 |
806 |
02-06-2020, 05:29 PM |
|
|
Thread: Multiple masks - repeated sequences
Post: RE: Multiple masks - repeated sequences
Do the math of how many combinations it will actually save you, compared to the total number of combinations.
It's rarely worth the effort to eliminate the relatively small number of duplicates lik... |
|
royce |
hashcat
|
2 |
625 |
05-19-2020, 10:01 PM |
|
|
Thread: Brute-Force custom character
Post: RE: Brute-Force custom character
Following up from your other deleted post, in which you said there are exactly 8 upper and 5 digits.
There are probably too many combinations to reasonably exhaust, but to model how many masks woul... |
|
royce |
hashcat
|
2 |
792 |
05-20-2020, 04:07 AM |
|
|
Thread: Missing characters from hashcat brute-force?
Post: RE: Missing characters from hashcat brute-force?
Yes, the default incremental mode is not a full brute force, but rather one that is optimized for likely candidates without being exhaustive:
Guess.Mask.......: ?1?2?2?2?2?2?2?3 [8]
Guess.Charset.... |
|
royce |
hashcat
|
2 |
705 |
05-26-2020, 08:16 PM |
|
|
Thread: Improved Mask Attack
Post: RE: Improved Mask Attack
Look at the custom character set parameters (-1 / -2 / -3 / -4) |
|
royce |
hashcat
|
2 |
705 |
05-28-2020, 11:42 PM |
|
|
Thread: Hashcat don't use my GPU or my GPU are bottleneck
Post: RE: Hashcat don't use my GPU or my GPU are bottlen...
Wordlist-only attacks (without additional work like rules or hybrid masks) cannot reach full benchmark speeds, because not enough work (candidate words) can be supplied to keep up with the speed of th... |
|
royce |
hashcat
|
2 |
735 |
06-05-2020, 03:56 AM |
|
|
Thread: What does this hashcat outupt mean?
Post: RE: What does this hashcat outupt mean?
They are the ones that have actually been applied. :)
The phrasing could be more clear - I'll propose something better.
Thanks for the question - this will hopefully make things more clear for o... |
|
royce |
hashcat
|
2 |
623 |
06-23-2020, 10:08 PM |
|
|
Thread: HashCat without GPU. Is it possible to increase speed?
Post: RE: HashCat without GPU. Is it possible to increas...
No, SVGA is a very low-level emulated GPU, and does not have OpenCL or CUDA support. |
|
royce |
hashcat
|
2 |
556 |
06-28-2020, 07:17 PM |
|
|
Thread: hashcat mask
Post: RE: hashcat mask
Hint for calculating total keyspace:
https://www.wolframalpha.com/input/?i=%2826%2B10%29%5E11
Divide this by your actual attack speed in hashes per second. For example, if your speed is 200M H/s... |
|
royce |
hashcat
|
2 |
568 |
07-19-2020, 04:16 PM |
|
|
Thread: Hashcat Dictionairy Cache Hit
Post: RE: Hashcat Dictionairy Cache Hit
You're cracking "password\n", not "password":
Code:
--
$ echo -n 'password' | md5sum
5f4dcc3b5aa765d61d8327deb882cf99 -
$ echo 'password' | md5sum
286755fad04869ca523320acce0dc6a4 -
--
... |
|
royce |
hashcat
|
2 |
455 |
07-28-2020, 03:39 AM |
|
|
Thread: Optimized kernel giving different results
Post: RE: Optimized kernel giving different results
Thanks! I see it's at https://github.com/hashcat/hashcat/issues/2539
(Also that is a hilarious username) |
|
royce |
hashcat
|
2 |
343 |
09-03-2020, 04:11 AM |