Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Ransomware attack [email protected]
Post: RE: Ransomware attack [email protected]
Jase, you might consider consulting with your local law enforcement. They often have access to tools to help you narrow down the variant and might be able to tell you more about how this particular va... |
|
royce |
hashcat
|
4 |
4,899 |
01-13-2019, 08:35 PM |
|
|
Thread: 0% progress
Post: RE: 0% progress
'Rejected' means 'password candidate was inapplicable' (such as if it was too long or too short for that hash algorithm) rather than 'password candidate was tried and it didn't work'.
Recommendatio... |
|
royce |
hashcat
|
4 |
2,489 |
01-19-2019, 07:42 PM |
|
|
Thread: 0% progress
Post: RE: 0% progress
Progress in this context is 'how many hashes were successfully cracked'. So if you're only cracking a single hash, progress will always be either 0 or 100. :) |
|
royce |
hashcat
|
4 |
2,489 |
01-19-2019, 09:39 PM |
|
|
Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters
This Stackexchange thread may be informative - it has some examples:
https://security.stackexchange.com/questions/154901/attack-wpa-password-with-hashcat-settings-and-resources-for-german-passwords/1... |
|
royce |
hashcat
|
4 |
3,252 |
01-29-2019, 03:09 AM |
|
|
Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters
It's often better to encode the custom charsets in the mask file itself, because it's persistent documentation of the nature of the attack that lives beyond that particular commandline. |
|
royce |
hashcat
|
4 |
3,252 |
01-30-2019, 05:12 PM |
|
|
Thread: Combining a custom hex charset with the standard charsets
Post: RE: Combining a custom hex charset with the standa...
You have to use a list of masks that represent all possible character positions in the target. This is of course not ideal; if hashcat had support for multibyte characters, all of these workarounds wo... |
|
royce |
hashcat
|
4 |
2,417 |
01-31-2019, 06:27 PM |
|
|
Thread: i need to make 6number dic list
Post: RE: i need to make 6number dic list
hashcat doesn't need an external wordlist for this. Just use -a 3 and ?d?d?d?d?d?d. |
|
royce |
hashcat
|
4 |
2,160 |
02-02-2019, 07:46 PM |
|
|
Thread: Combining a custom hex charset with the standard charsets
Post: RE: Combining a custom hex charset with the standa...
|
royce |
hashcat
|
4 |
2,417 |
02-05-2019, 05:56 PM |
|
|
Thread: iClass request
Post: RE: iClass request
https://www.cs.bham.ac.uk/~garciaf/publications/dismantling.iClass.pdf |
|
royce |
hashcat
|
4 |
2,577 |
03-16-2019, 01:38 AM |
|
|
Thread: Can I use Hashcat for checking against HIBP DB?
Post: RE: Can I use Hashcat for checking against HIBP DB...
Well, theoretically, you could download the HIBP SHA-1 hashes from https://haveibeenpwned.com/Passwords, and then crack them with hashcat using your list as a wordlist. But since the HIBP list is so l... |
|
royce |
hashcat
|
4 |
3,071 |
03-10-2019, 06:30 PM |
|
|
Thread: Alternatives to HashcatGUI?
Post: RE: Alternatives to HashcatGUI?
|
royce |
hashcat
|
4 |
1,994 |
07-06-2019, 08:31 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
Hello! Please post in English. Use Google Translate if you need to.
Here is a Google Translate translation of the above:
I am learning hashcat, but its instructions make me a headache. I searched a ... |
|
royce |
hashcat
|
4 |
1,879 |
09-01-2019, 07:06 PM |
|
|
Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...
https://www.google.com/search?q=hashcat+%28novice+OR+beginner%29+%28tutorial+OR+howto%29
... yields:
https://laconicwolf.com/2018/09/29/hashcat-tutorial-the-basics-of-cracking-passwords-with-has... |
|
royce |
hashcat
|
4 |
1,879 |
09-02-2019, 04:37 PM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
So you know the base word, and you need to append some a special and two numbers?
-r ./rules/hybrid/append_s.rule -r ./rules/hybrid/append_d.rule -r -r ./rules/hybrid/append_d.rule |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 02:09 AM |
|
|
Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack
Because masks are executed on GPU, it's probably much faster to just run it as a hybrid (-a 6) or mask attack. |
|
royce |
hashcat
|
4 |
1,997 |
09-08-2019, 03:43 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Do you mean that the plaintext is 32 characters?
If so, then unless you have a strong idea of its composition, bruteforce cannot reach even half of that keyspace. |
|
royce |
hashcat
|
4 |
1,655 |
10-21-2019, 06:20 AM |
|
|
Thread: Hashcat vs Keepass 2 (.kdbx)
Post: RE: Hashcat vs Keepass 2 (.kdbx)
As slyexe said, you cannot request hash-cracking help on this forum. Please remove these requests from your post, or you risk being banned. |
|
royce |
hashcat
|
4 |
1,962 |
12-03-2019, 04:49 AM |
|
|
Thread: Need a new hardware to run Hashcat?
Post: RE: Need a new hardware to run Hashcat?
If your card is still supported by latest stable AMD drivers, it should be supported by hashcat. |
|
royce |
hashcat
|
4 |
1,509 |
12-19-2019, 09:27 AM |
|
|
Thread: dapp / digital currency for password cracking
Post: RE: dapp / digital currency for password cracking
https://security.stackexchange.com/questions/62800/is-it-possible-to-use-bitcoin-miners-to-decrypt-files-communication |
|
royce |
General Talk
|
4 |
1,730 |
01-10-2020, 07:49 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit:
https://github.com/iphelix/pack/... |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 04:04 AM |