Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Noob question: md5 salted unix unknown password cracking
Post: RE: Noob question: md5 salted unix unknown passwor...
Per the forum rules:
https://hashcat.net/forum/archive/index.php?announcement-2.html
... do not post hashes. I've redacted yours. |
|
royce |
hashcat
|
2 |
1,078 |
12-21-2019, 01:52 AM |
|
|
Thread: SHA256 (AuthMe)
Post: RE: SHA256 (AuthMe)
This type is present in the beta version, not yet released.
https://hashcat.net/beta/
Or you can wait until the release. |
|
royce |
hashcat
|
2 |
1,085 |
01-25-2020, 07:35 PM |
|
|
Thread: help finding installed hashcat potfile
Post: RE: help finding installed hashcat potfile
On Unix-likes, it's in a .hashcat directory in the user's home directory. Not sure if this is also true for macOS. |
|
royce |
hashcat
|
2 |
823 |
01-28-2020, 07:00 AM |
|
|
Thread: is sorting wordlist by length needed?
Post: RE: is sorting wordlist by length needed?
This is no longer necessary in modern hashcat. I've added a note to the end of that paragraph to make that explicit. Thanks for the indirect docs-bug report, always appreciated. :D |
|
royce |
hashcat
|
2 |
806 |
02-06-2020, 05:29 PM |
|
|
Thread: Multiple masks - repeated sequences
Post: RE: Multiple masks - repeated sequences
Do the math of how many combinations it will actually save you, compared to the total number of combinations.
It's rarely worth the effort to eliminate the relatively small number of duplicates lik... |
|
royce |
hashcat
|
2 |
625 |
05-19-2020, 10:01 PM |
|
|
Thread: Brute-Force custom character
Post: RE: Brute-Force custom character
Following up from your other deleted post, in which you said there are exactly 8 upper and 5 digits.
There are probably too many combinations to reasonably exhaust, but to model how many masks woul... |
|
royce |
hashcat
|
2 |
792 |
05-20-2020, 04:07 AM |
|
|
Thread: Missing characters from hashcat brute-force?
Post: RE: Missing characters from hashcat brute-force?
Yes, the default incremental mode is not a full brute force, but rather one that is optimized for likely candidates without being exhaustive:
Guess.Mask.......: ?1?2?2?2?2?2?2?3 [8]
Guess.Charset.... |
|
royce |
hashcat
|
2 |
705 |
05-26-2020, 08:16 PM |
|
|
Thread: Improved Mask Attack
Post: RE: Improved Mask Attack
Look at the custom character set parameters (-1 / -2 / -3 / -4) |
|
royce |
hashcat
|
2 |
705 |
05-28-2020, 11:42 PM |
|
|
Thread: Hashcat don't use my GPU or my GPU are bottleneck
Post: RE: Hashcat don't use my GPU or my GPU are bottlen...
Wordlist-only attacks (without additional work like rules or hybrid masks) cannot reach full benchmark speeds, because not enough work (candidate words) can be supplied to keep up with the speed of th... |
|
royce |
hashcat
|
2 |
735 |
06-05-2020, 03:56 AM |
|
|
Thread: What does this hashcat outupt mean?
Post: RE: What does this hashcat outupt mean?
They are the ones that have actually been applied. :)
The phrasing could be more clear - I'll propose something better.
Thanks for the question - this will hopefully make things more clear for o... |
|
royce |
hashcat
|
2 |
623 |
06-23-2020, 10:08 PM |
|
|
Thread: HashCat without GPU. Is it possible to increase speed?
Post: RE: HashCat without GPU. Is it possible to increas...
No, SVGA is a very low-level emulated GPU, and does not have OpenCL or CUDA support. |
|
royce |
hashcat
|
2 |
556 |
06-28-2020, 07:17 PM |
|
|
Thread: hashcat mask
Post: RE: hashcat mask
Hint for calculating total keyspace:
https://www.wolframalpha.com/input/?i=%2826%2B10%29%5E11
Divide this by your actual attack speed in hashes per second. For example, if your speed is 200M H/s... |
|
royce |
hashcat
|
2 |
567 |
07-19-2020, 04:16 PM |
|
|
Thread: Hashcat Dictionairy Cache Hit
Post: RE: Hashcat Dictionairy Cache Hit
You're cracking "password\n", not "password":
Code:
--
$ echo -n 'password' | md5sum
5f4dcc3b5aa765d61d8327deb882cf99 -
$ echo 'password' | md5sum
286755fad04869ca523320acce0dc6a4 -
--
... |
|
royce |
hashcat
|
2 |
455 |
07-28-2020, 03:39 AM |
|
|
Thread: Optimized kernel giving different results
Post: RE: Optimized kernel giving different results
Thanks! I see it's at https://github.com/hashcat/hashcat/issues/2539
(Also that is a hilarious username) |
|
royce |
hashcat
|
2 |
343 |
09-03-2020, 04:11 AM |
|
|
Thread: Using two rule files at the same time
Post: RE: Using two rule files at the same time
It's the product of both rulesets - rule 1 from list 1 AND rule 1 from list 2, etc etc.
This is one reason why ':' (do nothing) is often included in rulesets, so that each rule from each wordlist i... |
|
royce |
hashcat
|
2 |
325 |
09-06-2020, 11:41 PM |
|
|
Thread: Expected hashrates with -m 22000
Post: RE: Expected hashrates with -m 22000
If you GPU is consistently showing 100% utilization, you're supplying enough work for the GPUs to not be bored. For a slower hash like the WPA family, speeds like you're showing aren't unreasonable, b... |
|
royce |
hashcat
|
2 |
384 |
09-23-2020, 08:13 AM |
|
|
Thread: Prince
Post: RE: Prince
https://lmgtfy.com/?q=prince+attack
;) |
|
royce |
Old hashcat Support
|
1 |
4,401 |
05-06-2016, 03:21 PM |
|
|
Thread: Hashcat 3 - help with hash type
Post: RE: Hashcat 3 - help with hash type
This should probably be created as a Github issue instead, in the same style as https://github.com/hashcat/hashcat/issues/398 |
|
royce |
hashcat
|
1 |
3,178 |
06-30-2016, 05:04 PM |
|
|
Thread: How I can make a more efficient bruteforce attack?
Post: RE: How I can make a more efficient bruteforce att...
Take a look at
https://hashcat.net/wiki/doku.php?id=rule_based_attack
The 'd' rule function repeats a word. |
|
royce |
General Talk
|
1 |
3,240 |
08-02-2016, 03:02 PM |
|
|
Thread: Legacy Hashcat
Post: RE: Legacy Hashcat
[hr]
https://hashcat.net/files_legacy/oclHashcat-2.01.7z
https://hashcat.net/files_legacy/cudaHashcat-2.01.7z
Be aware that if your GPUs are no longer supported by the manufacturer, they are not s... |
|
royce |
hashcat
|
1 |
2,975 |
08-13-2016, 07:39 PM |