Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
Yeah, the naming cat is probably already out of the bag.
I've clarified the FAQ section to make it very clear that hashcat --keyspace is specifically for distributing work, and does not directly co... |
|
royce |
hashcat
|
15 |
20,287 |
11-25-2017, 10:38 PM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
epixoip Wrote: (11-28-2017, 05:02 AM)
--
I can't really explain it any better than I already did in the thread you linked to. I guess I can try to expand upon it.
--
Great writeup. Totally stealing... |
|
royce |
hashcat
|
15 |
20,287 |
11-30-2017, 05:26 PM |
|
|
Thread: How do I speed up my laptop
Post: RE: How do I speed up my laptop
Using hashcat on systems for which you are not explicitly authorized to do so ... is a very, very bad idea. What you're describing is certainly unethical, and may even be illegal (but IANAL and this i... |
|
royce |
Hardware
|
15 |
10,084 |
06-04-2018, 03:42 AM |
|
|
Thread: How do I speed up my laptop
Post: RE: How do I speed up my laptop
That's some kind of weird GPU subscription/membership thing I've never seen before. But the card itself looks right. The "Founders Edition" cards are the hardiest and have the best cooling design - bu... |
|
royce |
Hardware
|
15 |
10,084 |
06-04-2018, 05:07 AM |
|
|
Thread: How do I speed up my laptop
Post: RE: How do I speed up my laptop
Yeah, agreed - that looks pretty shady. |
|
royce |
Hardware
|
15 |
10,084 |
06-04-2018, 05:22 PM |
|
|
Thread: How do I speed up my laptop
Post: RE: How do I speed up my laptop
https://gist.github.com/roycewilliams/616db7a80f145f46a40807b7605c164a |
|
royce |
Hardware
|
15 |
10,084 |
06-07-2018, 06:34 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
To fully take advantage of GPU for a fast hash like MD5, you have to have more than a few rules.
You might try emulating a hybrid attack with generated rules.
https://hashcat.net/wiki/doku.php?i... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 04:50 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Yeah, like I said in my edit - it doesn't work like I was hoping it would. I don't have a better answer yet.
But notice that what I was trying to do - generate some of the word on GPU with a large ... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:32 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
I'm guessing ... but if I had to say, it's probably that in practice, most attacks are possible without it (by chaining stuff together, Unix-style) - so adding it internally could (arguably) add unnec... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:43 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
You might try increasing the number of masks, to see if that improves performance.
But generally speaking, I suspect that full bruteforce has some attack-specific optimizations that make it pretty ... |
|
royce |
hashcat
|
14 |
14,530 |
11-23-2017, 06:18 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
OK, this is ugly as heck, and buggy (it doesn't fully emulate bruteforce for the last two characters), but it's getting close:
Code:
--
$ for item in `mp64 '?aTEMP?a'`; do echo "di6${item}iE${it... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 06:20 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Man, I thought I tried that and it didn't work. But I checked and it was failing for other syntax reasons.
So:
Code:
--
$ cat double.rule
d
$ mp64 '$?a$?a' >append-aa.rule
$ head appen... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 08:33 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Please post your command line, with any sensitive info replaced with generic info |
|
royce |
hashcat
|
14 |
1,235 |
09-08-2020, 06:00 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
If you delete the empty potfile, is it recreated on the next run? |
|
royce |
hashcat
|
14 |
1,235 |
09-09-2020, 03:09 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
@philsmd, I can recreate this - for both TrueCrypt and Veracrypt, it seems, if a session is specified, but a potfile is not, then ses.potfile is not created on the fly that I can find (on Linux, anywa... |
|
royce |
hashcat
|
14 |
1,235 |
09-21-2020, 11:16 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Huh - when I did my veracrypt testing in late 2018, it used the filename. This seems like the approach that would cause the least amount of confusion. Otherwise, we'll have a steady stream of users as... |
|
royce |
hashcat
|
14 |
1,235 |
09-24-2020, 07:47 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
I've also opened an issue to explore improvements here:
https://github.com/hashcat/hashcat/issues/2554 |
|
royce |
hashcat
|
14 |
1,235 |
09-25-2020, 03:52 AM |
|
|
Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2
atom also came up with a pretty clever way to push more data across the PCI-e!
https://hashcat.net/forum/thread-7267-post-39112.html |
|
royce |
hashcat
|
13 |
18,415 |
02-05-2018, 09:22 PM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
Your example in crackitBruteForce.sh will only match three-digits-per-octet IPs (111.111.111.111) and miss other possibilities (111.111.111.1, 1.1.1.1, 11.11.11.11, etc.)
This is closer: https://pa... |
|
royce |
hashcat
|
13 |
9,512 |
02-26-2018, 02:10 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
Couple of niggles:
- That larger file I linked to covers actual possible IP addresses. Many ?d?d?d (above 254) are invalid in an IP-address octet. So your masks will try many IPs that are not valid... |
|
royce |
hashcat
|
13 |
9,512 |
02-26-2018, 08:15 AM |