Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?
You could use mp64 to generate them, maybe?
https://hashcat.net/wiki/doku.php?id=rules_with_maskprocessor
Might still have to dedupe it a little after, depending |
|
royce |
hashcat
|
10 |
965 |
08-31-2020, 11:53 PM |
|
|
Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?
Dedupe of text on the command line is a largely solved problem. Depends on your platform. 'sort -u' on Unix-likes covers most use cases. On Windows, 'sort.exe /unique' seems roughly equivalent. |
|
royce |
hashcat
|
10 |
965 |
09-01-2020, 04:10 AM |
|
|
Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?
There's also this project, that tries to detect rules with redundant results:
https://github.com/0xbsec/duprule/ |
|
royce |
hashcat
|
10 |
965 |
09-01-2020, 05:04 PM |
|
|
Thread: Ubuntu 14.04 Hashcat command?
Post: RE: Ubuntu 14.04 Hashcat command?
Prepend "./" (because the current directory isn't in your path by default in Linux) and use the executable for your platform (cudaHashcat64.bin or the 32-bit equivalent). |
|
royce |
Old hashcat Support
|
11 |
16,491 |
11-16-2015, 02:40 AM |
|
|
Thread: long mask issue
Post: RE: long mask issue
If you really think that your target plaintext is 32 digits long, you will need more information about digit placement and likelihood to have any hope of cracking it.
To answer the literal part of yo... |
|
royce |
hashcat
|
11 |
12,841 |
02-11-2017, 11:54 PM |
|
|
Thread: long mask issue
Post: RE: long mask issue
Ah, and to be precise even further ... it would never exhaust, because it's not controlled. |
|
royce |
hashcat
|
11 |
12,841 |
02-12-2017, 05:14 AM |
|
|
Thread: long mask issue
Post: RE: long mask issue
devilsadvocate Wrote: (02-12-2017, 05:44 AM)
--
Generating random input to hashcat has its uses despite what you may think.
--
Only in the same sense that a starving man might find it "useful" to wa... |
|
royce |
hashcat
|
11 |
12,841 |
02-12-2017, 06:28 AM |
|
|
Thread: long mask issue
Post: RE: long mask issue
Your target ... is randomly generated ... and changes every 30 seconds?
o_O
The chances of you getting "lucky" are:
(45Gh/s * 30) / 10^32 ≈ 1 in 7.407×10^19
... or roughly 1 chance in 7,407,407... |
|
royce |
hashcat
|
11 |
12,841 |
02-12-2017, 09:44 PM |
|
|
Thread: long mask issue
Post: RE: long mask issue
devilsadvocate Wrote: (02-12-2017, 02:33 AM)
--
royce Wrote: (02-11-2017, 11:54 PM)
--
If you really think that your target plaintext is 32 digits long, you will need more information about digit pl... |
|
royce |
hashcat
|
11 |
12,841 |
02-12-2017, 05:04 AM |
|
|
Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...
I can't speak to CPU (other than "generally faster is better" and "at least one core per GPU") or RAM (other than "more than 32GB for analyzing big wordlists").
For density (packing a good amount of ... |
|
royce |
Hardware
|
11 |
13,250 |
03-27-2017, 09:33 PM |
|
|
Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...
More cores is good. Current state of the art is NVIDIA (because of the LOPT3.LUT instruction set, I think?) |
|
royce |
Hardware
|
11 |
13,250 |
03-30-2017, 06:14 PM |
|
|
Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...
It is definitely supported by hashcat. Some benchmarks from @epixoip are here:
https://gist.github.com/epixoip/973da7352f4cc005746c627527e4d073 |
|
royce |
Hardware
|
11 |
13,250 |
04-01-2017, 12:01 AM |
|
|
Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...
PCI-E lanes are good for gaming, but hashcat does not care. x1 would even be sufficient for hashcat.
If you intend to use the system for multiple password-auditing purposes, a minimum of x4 might ... |
|
royce |
Hardware
|
11 |
13,250 |
04-03-2017, 07:24 PM |
|
|
Thread: hashcat v4.0.0
Post: RE: hashcat v4.0.0
A *lot* of work behind the scenes to make longer passwords possible. Thank you, atom!
(And don't forget: if you don't need longer passwords, always remember to add -O now!)
Selected benchmarks (... |
|
royce |
hashcat
|
11 |
86,633 |
10-27-2017, 05:43 PM |
|
|
Thread: hashcat v4.0.0
Post: RE: hashcat v4.0.0
Fair question - though it's also the case that existing rules will now produce results that wouldn't have worked before.
In other words, if you run your existing rules and lists against your unfoun... |
|
royce |
hashcat
|
11 |
86,633 |
11-20-2017, 06:28 PM |
|
|
Thread: 3DES Is there a problem? where did I go wrong ?
Post: RE: 3DES Is there a problem? where did I go wrong ...
No. Do the math (seriously, as in do the actual calculation of multiplying hashes per second by the number of hashes, using something like Wolfram Alpha) so that you understand why it's literally impo... |
|
royce |
hashcat
|
11 |
6,630 |
11-11-2018, 03:32 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified.
It defaults to this mask:
-1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 06:42 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max. |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 06:50 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
No utility necessary - honest. :D Study the default, understand how it works, and then adapt it to your needs. :D |
|
royce |
hashcat
|
11 |
2,908 |
09-21-2019, 07:15 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
Yes - the one I first posted. ;)
Study how custom character set works, and replace sequences like this:
?l?l?l?l?l?l?l?l
?u?l?l?l?l?l?l?l
?d?l?l?l?l?l?l?l
... with:
-1 ?l?u?d ?1?l?l?l?l?... |
|
royce |
hashcat
|
11 |
2,908 |
09-22-2019, 06:40 PM |