Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
cryptozin, please don't hijack threads. If you have a different question, please start a new thread. |
|
royce |
hashcat
|
16 |
9,777 |
05-12-2018, 03:56 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
Not much to go on to help you here.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a... |
|
royce |
hashcat
|
16 |
9,777 |
05-13-2018, 04:00 AM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: [ANSWERED] New user, custom brute force help
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore. |
|
royce |
hashcat
|
16 |
9,777 |
05-14-2018, 12:59 AM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil... |
|
royce |
hashcat
|
17 |
24,506 |
08-31-2016, 11:22 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt.
Can you post the full command line you're using? |
|
royce |
hashcat
|
17 |
24,506 |
09-01-2016, 01:23 AM |
|
|
Thread: bitcoin mining vs password cracking?
Post: RE: bitcoin mining vs password cracking?
You're probably better off just running a benchmark for your specific setup, or using tools like https://whattomine.com/ |
|
royce |
General Talk
|
17 |
18,837 |
10-03-2017, 07:50 PM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Do a little more research into how to make images that compress well. It's quite feasible to make images that are very small. This avatar is only 3K:
https://gravatar.com/avatar/f720786ef4b2ff5b4b... |
|
royce |
hashcat
|
18 |
12,096 |
04-14-2018, 04:15 PM |
|
|
Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM
Nice catch/answer, undeath |
|
royce |
User Contributions
|
18 |
36,654 |
05-12-2018, 07:18 PM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
With the upcoming -S / --slow-candidates option, it may be that a better approach for this could be possible. |
|
royce |
hashcat
|
19 |
9,937 |
09-03-2018, 04:27 AM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
Fair. I'm a little over my head here, but it does sound as though the length enforcement is happening in the wrong place for slow hashes. |
|
royce |
hashcat
|
19 |
9,937 |
09-03-2018, 04:39 PM |
|
|
Thread: First Cracking Rig
Post: RE: First Cracking Rig
I hadn't seen that case before - interesting form factor. If you intend to run long jobs, make sure that your cooling of the room itself is adequate.
I haven't done the math, but 2x1600 PSUs seems ... |
|
royce |
Hardware
|
19 |
10,139 |
02-19-2019, 05:29 PM |
|
|
Thread: First Cracking Rig
Post: RE: First Cracking Rig
Since mining has dropped off a bit, you can probably pick up some of the higher-end multi-PCIe boards for pretty cheap. Some examples:
https://bitcoin.zorinaq.com/many_pcie/
Some attacks are happier ... |
|
royce |
Hardware
|
19 |
10,139 |
02-19-2019, 05:49 PM |
|
|
Thread: Nvidia 3080 benchmarks
Post: RE: Nvidia 3080 benchmarks
Watch @Chick3nman512 on Twitter - he'll likely be posting some in the next day or two. |
|
royce |
Hardware
|
19 |
4,598 |
09-16-2020, 08:04 PM |
|
|
Thread: Mask not finding password Straight hit or miss.
Post: RE: Mask not finding password Straight hit or miss...
Hi, Robert - could you please copy and paste the simplest, but complete, cmdline example and resulting output that demonstrates the issue, including an artificial/synthetic hash with a known password ... |
|
royce |
hashcat
|
20 |
5,249 |
11-15-2019, 08:56 PM |
|
|
Thread: Mask not finding password Straight hit or miss.
Post: RE: Mask not finding password Straight hit or miss...
Also, could you please confirm whether the 'rdgeno' user on these forums is also you?
https://hashcat.net/forum/user-12496.html
If so, why are you creating multiple accounts? |
|
royce |
hashcat
|
20 |
5,249 |
11-15-2019, 08:59 PM |
|
|
Thread: Mask not finding password Straight hit or miss.
Post: RE: Mask not finding password Straight hit or miss...
Are you having to use --force? Can you please post the actual full commands you're using? |
|
royce |
hashcat
|
20 |
5,249 |
11-17-2019, 12:43 AM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
GPU is usually better.
There's no way to use more memory at the hashcat level. Some background on the 25% memory cap is here (https://devtalk.nvidia.com/default/topic/992502/cuda-programming-and-per... |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 08:11 AM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
I don't know a lot about Mac hardware, but I would assume that this is because the GPU in that unit is slower than the CPU? In my experience, the GPU is usually better, though, so someone else may kno... |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 08:37 AM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
That definitely works. Orient yourself with your command line.
Code:
--
$ hashcat -b -m 0
hashcat (v3.30-317-g778f568) starting in benchmark mode...
OpenCL Platform #1: NVIDIA Corporation
===... |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 05:58 PM |
|
|
Thread: CPU vs GPU
Post: RE: CPU vs GPU
Also note that the "maximum power" you mentioned early is memory size, which has no relationship to speed. |
|
royce |
hashcat
|
21 |
44,484 |
02-26-2017, 06:00 PM |