Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Mask not finding password Straight hit or miss.
Post: RE: Mask not finding password Straight hit or miss...
Are you having to use --force? Can you please post the actual full commands you're using? |
|
royce |
hashcat
|
20 |
5,249 |
11-17-2019, 12:43 AM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
With the upcoming -S / --slow-candidates option, it may be that a better approach for this could be possible. |
|
royce |
hashcat
|
19 |
9,934 |
09-03-2018, 04:27 AM |
|
|
Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking
Fair. I'm a little over my head here, but it does sound as though the length enforcement is happening in the wrong place for slow hashes. |
|
royce |
hashcat
|
19 |
9,934 |
09-03-2018, 04:39 PM |
|
|
Thread: First Cracking Rig
Post: RE: First Cracking Rig
I hadn't seen that case before - interesting form factor. If you intend to run long jobs, make sure that your cooling of the room itself is adequate.
I haven't done the math, but 2x1600 PSUs seems ... |
|
royce |
Hardware
|
19 |
10,136 |
02-19-2019, 05:29 PM |
|
|
Thread: First Cracking Rig
Post: RE: First Cracking Rig
Since mining has dropped off a bit, you can probably pick up some of the higher-end multi-PCIe boards for pretty cheap. Some examples:
https://bitcoin.zorinaq.com/many_pcie/
Some attacks are happier ... |
|
royce |
Hardware
|
19 |
10,136 |
02-19-2019, 05:49 PM |
|
|
Thread: Nvidia 3080 benchmarks
Post: RE: Nvidia 3080 benchmarks
Watch @Chick3nman512 on Twitter - he'll likely be posting some in the next day or two. |
|
royce |
Hardware
|
19 |
4,598 |
09-16-2020, 08:04 PM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Do a little more research into how to make images that compress well. It's quite feasible to make images that are very small. This avatar is only 3K:
https://gravatar.com/avatar/f720786ef4b2ff5b4b... |
|
royce |
hashcat
|
18 |
12,095 |
04-14-2018, 04:15 PM |
|
|
Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM
Nice catch/answer, undeath |
|
royce |
User Contributions
|
18 |
36,654 |
05-12-2018, 07:18 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil... |
|
royce |
hashcat
|
17 |
24,505 |
08-31-2016, 11:22 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt.
Can you post the full command line you're using? |
|
royce |
hashcat
|
17 |
24,505 |
09-01-2016, 01:23 AM |
|
|
Thread: bitcoin mining vs password cracking?
Post: RE: bitcoin mining vs password cracking?
You're probably better off just running a benchmark for your specific setup, or using tools like https://whattomine.com/ |
|
royce |
General Talk
|
17 |
18,837 |
10-03-2017, 07:50 PM |
|
|
Thread: Bitslice status and broken nvcc
Post: RE: Bitslice status and broken nvcc
Can the source be reduced to a minimal test case, suitable for sharing with the nvcc team? |
|
royce |
General Talk
|
16 |
25,328 |
10-25-2015, 07:40 AM |
|
|
Thread: New Cracking Build Feedback
Post: RE: New Cracking Build Feedback
I'd recommend something other than K a l i for the main OS. It doesn't play well with OpenCL and hashcat sometimes. |
|
royce |
Hardware
|
16 |
14,432 |
12-06-2017, 09:24 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
[heh, yeah - what philsmd said. :) ]
Are you getting an error, by any chance?
I think if you use --hex-charset, hashcat expects the other literals in the mask to either also be hex or else to be ... |
|
royce |
hashcat
|
16 |
9,670 |
04-22-2018, 07:34 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
Regardless of attack, -m 0 is unsalted and -m 20 is salted. If this concept isn't familiar, search a bit for "password" and "salting". |
|
royce |
hashcat
|
16 |
9,670 |
04-25-2018, 07:28 AM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
cryptozin, please don't hijack threads. If you have a different question, please start a new thread. |
|
royce |
hashcat
|
16 |
9,774 |
05-12-2018, 03:56 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
Not much to go on to help you here.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a... |
|
royce |
hashcat
|
16 |
9,774 |
05-13-2018, 04:00 AM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: [ANSWERED] New user, custom brute force help
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore. |
|
royce |
hashcat
|
16 |
9,774 |
05-14-2018, 12:59 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
For more on the scope and impact of keyspace, see
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace
Also, atom: can you speak to what keyspace is actually intend... |
|
royce |
hashcat
|
15 |
20,287 |
11-24-2017, 02:55 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
*lightbulb*
Ahhhh ... so they only need to be "proportional" within specific attack type/combos, and that's why they can't be compared across them! Because it's *called* a keyspace ... but it isn't... |
|
royce |
hashcat
|
15 |
20,287 |
11-24-2017, 11:00 AM |