Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Custom mask generator
Post: RE: Custom mask generator
Most of what you're looking to do can be accomplished with the PACK toolkit:
https://github.com/iphelix/pack
The 'policygen' tool can help generate masks with arbitrary policies (and they won't ... |
|
royce |
hashcat
|
11 |
5,302 |
12-26-2019, 03:45 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
Could you elaborate with a hypothetical/contrived example?
It sounds like you *might* be looking for masks. For example, if you know that a password is 10 characters and the first four characters a... |
|
royce |
hashcat
|
11 |
1,633 |
06-14-2020, 10:36 PM |
|
|
Thread: WPA 10 digit phone number using area code dictionary and 7 digit mask? HOW?
Post: RE: WPA 10 digit phone number using area code dict...
Hybrid (-a 6 - word list on left-hand side, mask on right) should work for your use case. Please try again, and post your command line for a cross-check. |
|
royce |
hashcat
|
12 |
16,742 |
10-20-2016, 09:15 PM |
|
|
Thread: LUKS Support
Post: RE: LUKS Support
I wondered why it'd been quiet in #hashcat lately. :) Amazing work!
Some quick benchmarks, stock clocks. Indeed, a slow algorithm.
hashcat (v3.30-20-gf88644f) starting in benchmark mode...
Op... |
|
royce |
User Contributions
|
12 |
40,930 |
01-21-2017, 10:09 PM |
|
|
Thread: Problem get password that is in dictionary
Post: RE: Problem get password that is in dictionary
Try testing with the example hashcat hash:
https://hashcat.net/wiki/doku.php?id=example_hashes
This is "hashcat": $2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6
If this works, it's mo... |
|
royce |
hashcat
|
12 |
12,533 |
02-28-2017, 04:49 PM |
|
|
Thread: Problem get password that is in dictionary
Post: RE: Problem get password that is in dictionary
Yes. Try it to see if it works. You are empowered to to definitively answer your own question. :) |
|
royce |
hashcat
|
12 |
12,533 |
03-02-2017, 05:00 PM |
|
|
Thread: Avoid character occurrance in brute force attack
Post: RE: Avoid character occurrance in brute force atta...
I don't think that there is a way to express this using hashcat's rules (unless you generated a very large list of masks and custom character sets).
And even if there were, I don't think that it wo... |
|
royce |
hashcat
|
12 |
12,015 |
03-06-2017, 01:49 AM |
|
|
Thread: PrinceProcessor now open source
Post: RE: PrinceProcessor now open source
I have changed ELEM_CNT_MAX, but have not tried changing OUT_LEN_MAX. |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
12 |
20,294 |
11-19-2017, 01:39 AM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
atom also came up with a pretty clever way to push more data across the PCI-e!
https://hashcat.net/forum/thread-7267-post-39112.html |
|
royce |
hashcat
|
13 |
18,419 |
02-05-2018, 09:22 PM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
Your example in crackitBruteForce.sh will only match three-digits-per-octet IPs (111.111.111.111) and miss other possibilities (111.111.111.1, 1.1.1.1, 11.11.11.11, etc.)
This is closer: https://pa... |
|
royce |
hashcat
|
13 |
9,512 |
02-26-2018, 02:10 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
Couple of niggles:
- That larger file I linked to covers actual possible IP addresses. Many ?d?d?d (above 254) are invalid in an IP-address octet. So your masks will try many IPs that are not valid... |
|
royce |
hashcat
|
13 |
9,512 |
02-26-2018, 08:15 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
undeath Wrote: (02-27-2018, 06:29 PM)
--
no, it doesn't. there are no instances of .?1 or .?2
--
That's what I get for not escaping my '?' in my egrep. :) Then I have no idea why the OP got that as... |
|
royce |
hashcat
|
13 |
9,512 |
02-27-2018, 07:03 PM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
I didn't write that paste, just grabbed it because it did the job. :)
Works for me:
Code:
--
# Get the masks file.
$ wget -O ip.masks https://pastebin.com/raw/4HQ6C8gG
[...]
# For effici... |
|
royce |
hashcat
|
13 |
9,512 |
02-27-2018, 05:25 PM |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
So I guess the answer to your question is "no"? :P :)
Sounds reproducible, so good catch. The steps necessary to reproduce, in a GitHub issue, would make this actionable. |
|
royce |
hashcat
|
13 |
32,462 |
05-17-2018, 05:43 AM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
Is the container mounted? You'll need to provide the path to the raw file, the raw device, or else extract the first 512 bytes and save that to a file to provide to hashcat.
Also, from your cmdline... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-18-2019, 05:19 PM |
|
|
Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...
Ha! I think I've just always wanted that syntax; didn't even give me pause. :D |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
5,771 |
08-18-2019, 07:29 PM |
|
|
Thread: help with hashcat.
Post: RE: help with hashcat.
Are you cards detected by hashcat? What is the output of hashcat -I? |
|
royce |
hashcat
|
13 |
2,607 |
04-25-2020, 06:41 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
To fully take advantage of GPU for a fast hash like MD5, you have to have more than a few rules.
You might try emulating a hybrid attack with generated rules.
https://hashcat.net/wiki/doku.php?i... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 04:50 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Yeah, like I said in my edit - it doesn't work like I was hoping it would. I don't have a better answer yet.
But notice that what I was trying to do - generate some of the word on GPU with a large ... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:32 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
I'm guessing ... but if I had to say, it's probably that in practice, most attacks are possible without it (by chaining stuff together, Unix-style) - so adding it internally could (arguably) add unnec... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:43 PM |