Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Weird estimated time
Post: RE: Weird estimated time
The time estimate is accurate. WPA is a slow hash, and you've requested a brute-force attack.
Most of the time, a full brute-force attack like the one you've crafted is a last-resort activity, aft... |
|
royce |
hashcat
|
5 |
3,467 |
06-05-2018, 05:27 AM |
|
|
Thread: Single-mode john analog for hashcat
Post: RE: Single-mode john analog for hashcat
I have to admit, it seems like single mode would only make a real difference for slow hashes for which each target password itself has a known per-password plaintext component (such as the Myspace lea... |
|
royce |
hashcat
|
5 |
4,080 |
06-21-2018, 06:16 AM |
|
|
Thread: Cant get hashcat to run on new cracking computer
Post: RE: Cant get hashcat to run on new cracking comput...
... and defined here:
Code:
--
https://github.com/hashcat/hashcat/blob/master/src/mpsp.c#L20
static const char *DEF_MASK = "?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d";
https://github.com/hashcat/hash... |
|
royce |
hashcat
|
5 |
3,495 |
07-01-2018, 08:37 PM |
|
|
Thread: need advice
Post: RE: need advice
I'm having trouble figuring out what advice you're looking for; can you rephrase as a specific question? |
|
royce |
hashcat
|
5 |
3,637 |
09-03-2018, 04:37 PM |
|
|
Thread: need advice
Post: RE: need advice
If it's 10 random digits, and there's no other pattern, that's probably the best you can do.
Adding -O / --optimized-kernel-enable might also help. |
|
royce |
hashcat
|
5 |
3,637 |
09-07-2018, 08:09 PM |
|
|
Thread: cl platform not found
Post: RE: cl platform not found
Try refreshing the entire stack with the applicable instructions from this question in the FAQ:
https://hashcat.net/faq/wrongdriver |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
5 |
5,339 |
09-09-2018, 03:33 AM |
|
|
Thread: 2 computers
Post: RE: 2 computers
Yes, you could use the brain for this. |
|
royce |
General Talk
|
5 |
4,235 |
11-09-2018, 08:41 AM |
|
|
Thread: md5($salt1,password,$salt2) ?
Post: RE: md5($salt1,password,$salt2) ?
That should be irrelevant. Only how special characters (like "?") are escaped on the OS-native command line (not a hashcat issue) should vary between the platforms. |
|
royce |
hashcat
|
5 |
3,103 |
11-11-2018, 03:25 PM |
|
|
Thread: IIS http digest
Post: RE: IIS http digest
If it's a test hash that you created yourself and has a known plaintext, then it's OK to post the whole hash (as long as you also include the plaintext). |
|
royce |
hashcat
|
5 |
3,178 |
11-19-2018, 06:37 PM |
|
|
Thread: Mask attack with brain
Post: RE: Mask attack with brain
Fast hashes can be too fast for brain to track exhausted attacks on a candidate-by-candidate basis (brain featureset 1 or 3), even if there is a very fast network between the brain server and the brai... |
|
royce |
hashcat
|
5 |
3,636 |
12-08-2018, 03:46 AM |
|
|
Thread: Parsing a Potfile
Post: RE: Parsing a Potfile
OP is looking for ways do to this in bulk, not one at a time.
I'm not aware of a generic tool for slicing and dicing potfiles. I think most people roll their own. But there are enough interesting a... |
|
royce |
hashcat
|
5 |
3,833 |
12-11-2018, 05:55 PM |
|
|
Thread: Parsing a Potfile
Post: RE: Parsing a Potfile
You'll probably have to invent something, then, based on principles like:
* If a hash:plain pair has more than one colon and isn't HEX-encoded, separate it out into its own file, then use a 'rev | ... |
|
royce |
hashcat
|
5 |
3,833 |
12-12-2018, 09:29 PM |
|
|
Thread: Need help working with masks
Post: RE: Need help working with masks
|
royce |
hashcat
|
5 |
2,537 |
02-03-2019, 06:51 PM |
|
|
Thread: Rejecting candidates under X characters while using rules set?
Post: RE: Rejecting candidates under X characters while ...
Yeah, I see the Layer-8 use case. You need to be able to assure people that you're not cracking passwords that are 15 chars or longer.
There's no way I know of within hashcat itself to guarantee that... |
|
royce |
hashcat
|
5 |
3,365 |
02-03-2019, 09:49 PM |
|
|
Thread: Rejecting candidates under X characters while using rules set?
Post: RE: Rejecting candidates under X characters while ...
Hmm, I wonder how hard it would be to modify hashcat to use -O to reject longer than 14 instead of 15. |
|
royce |
hashcat
|
5 |
3,365 |
02-03-2019, 10:01 PM |
|
|
Thread: Need help working with masks
Post: RE: Need help working with masks
We shall speak no more of it. :)
Generally, that's a hybrid attack, word-on-the-left style - hashcat attack mode 6 (-a 6).
Shifting case would be trickier - you'd have to preprocess the wordlist... |
|
royce |
hashcat
|
5 |
2,537 |
02-04-2019, 12:00 AM |
|
|
Thread: sagitta.pw, is it legit?
Post: RE: sagitta.pw, is it legit?
By "it" do you mean Hashstack, their software?
You only get it if you also buy their hardware. |
|
royce |
Hardware
|
5 |
3,071 |
03-31-2019, 04:53 AM |
|
|
Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt
There's no way to suppress these errors with a hashcat flag. --force certainly doesn't do that. |
|
royce |
hashcat
|
5 |
2,706 |
05-01-2019, 06:04 PM |
|
|
Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking
If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time.
If you do the math:
https://www.wolframalpha.com/input/?i=(26%2B26%2B34)... |
|
royce |
hashcat
|
5 |
3,976 |
08-04-2019, 08:12 PM |
|
|
Thread: TITAN RTX - performance issues?
Post: RE: TITAN RTX - performance issues?
It's OK to use hashcat GUI if it works for what you're trying to do. But many of the things you'll eventually want to do are better done with the command line directly. |
|
royce |
hashcat
|
5 |
2,340 |
10-29-2019, 06:16 AM |