Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
To fully take advantage of GPU for a fast hash like MD5, you have to have more than a few rules.
You might try emulating a hybrid attack with generated rules.
https://hashcat.net/wiki/doku.php?i... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 04:50 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Yeah, like I said in my edit - it doesn't work like I was hoping it would. I don't have a better answer yet.
But notice that what I was trying to do - generate some of the word on GPU with a large ... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:32 AM |
|
|
Thread: hashcat 3.60 / hashcat 4.x many hashes
Post: RE: hashcat 3.60 / hashcat 4.x many hashes
|
royce |
hashcat
|
4 |
3,473 |
11-22-2017, 05:45 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
OK, this is ugly as heck, and buggy (it doesn't fully emulate bruteforce for the last two characters), but it's getting close:
Code:
--
$ for item in `mp64 '?aTEMP?a'`; do echo "di6${item}iE${it... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 06:20 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
I'm guessing ... but if I had to say, it's probably that in practice, most attacks are possible without it (by chaining stuff together, Unix-style) - so adding it internally could (arguably) add unnec... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:43 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Man, I thought I tried that and it didn't work. But I checked and it was failing for other syntax reasons.
So:
Code:
--
$ cat double.rule
d
$ mp64 '$?a$?a' >append-aa.rule
$ head appen... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 08:33 PM |
|
|
Thread: hashcat 4.0.1 more slow than 3.6 (GT 740M)
Post: RE: hashcat 4.0.1 more slow than 3.6 (GT 740M)
asirena Wrote: (11-22-2017, 02:38 PM)
--
atom, you should use the same parameter in both cases in order to compare the results...
If you use -w4 with one of them and -w3 with the other one, you a... |
|
royce |
hashcat
|
7 |
6,862 |
11-22-2017, 08:47 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
You might try increasing the number of masks, to see if that improves performance.
But generally speaking, I suspect that full bruteforce has some attack-specific optimizations that make it pretty ... |
|
royce |
hashcat
|
14 |
14,530 |
11-23-2017, 06:18 AM |
|
|
Thread: newbie mask help
Post: RE: newbie mask help
Hitting 'Resume' when you're already running just prints 'Resumed' again, even if you are not paused.
If you press Enter, you'll see some progress information. Or you can add --status to display st... |
|
royce |
hashcat
|
3 |
3,417 |
11-23-2017, 07:01 PM |
|
|
Thread: Potfile format - to hex or not to hex
Post: RE: Potfile format - to hex or not to hex
With the recent appearance of --encoding-from and --encoding to, I wouldn't expect there to be any additional value in storing wordlists as hex. If you're getting additional hits because of them, they... |
|
royce |
hashcat
|
10 |
9,895 |
11-23-2017, 08:11 PM |
|
|
Thread: newbie mask help
Post: RE: newbie mask help
If you hit Enter, it should give you a current estimate. |
|
royce |
hashcat
|
3 |
3,417 |
11-24-2017, 01:55 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
For more on the scope and impact of keyspace, see
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace
Also, atom: can you speak to what keyspace is actually intend... |
|
royce |
hashcat
|
15 |
20,288 |
11-24-2017, 02:55 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
*lightbulb*
Ahhhh ... so they only need to be "proportional" within specific attack type/combos, and that's why they can't be compared across them! Because it's *called* a keyspace ... but it isn't... |
|
royce |
hashcat
|
15 |
20,288 |
11-24-2017, 11:00 AM |
|
|
Thread: [Solved] Combined attack with four words
Post: RE: Combined attack with four words
Unless it is an extremely slow hash, it's easier to just try all possible combinations of the four words, using something like
https://hashcat.net/wiki/doku.php?id=princeprocessor |
|
royce |
hashcat
|
2 |
2,634 |
11-25-2017, 06:19 PM |
|
|
Thread: bitcoin hash not started
Post: RE: bitcoin hash not started
Does OpenCL work with your card?
What OS, and what version of AMD drivers?
What is the output of hashcat -I?
Edit: it looks like that card has been "no more driver improvements" since 2015?
... |
|
royce |
hashcat
|
3 |
3,050 |
11-25-2017, 06:39 PM |
|
|
Thread: maskprocessor to output in HEX?
Post: RE: maskprocessor to output in HEX?
Not sure if this matches your use case, but FWIW, hops suggested this workaround:
Code:
--
$ ./mp64.bin -1 ?dabcdef '$HEX[?1?1]'
$HEX[00]
$HEX[01]
$HEX[02]
$HEX[03]
$HEX[04]
$HEX[05]
$HEX... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
5,357 |
11-25-2017, 10:34 PM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
Yeah, the naming cat is probably already out of the bag.
I've clarified the FAQ section to make it very clear that hashcat --keyspace is specifically for distributing work, and does not directly co... |
|
royce |
hashcat
|
15 |
20,288 |
11-25-2017, 10:38 PM |
|
|
Thread: bitcoin hash not started
Post: RE: bitcoin hash not started
According to the main hashcat webpage, this driver version is required:
AMD GPUs on Windows require "AMD Radeon Software Crimson Edition" (15.12 or later) |
|
royce |
hashcat
|
3 |
3,050 |
11-25-2017, 11:00 PM |
|
|
Thread: LUKS benchmarks and estimated times
Post: RE: LUKS benchmarks and estimated times
Mode 14600 (LUKS) benches at around 10k H/s on a GTX 1080 with -w 4 and -O.
If you have literally no idea what those 10 characters might be ... it ain't happenin' any time soon. |
|
royce |
hashcat
|
2 |
3,486 |
11-27-2017, 04:59 AM |
|
|
Thread: Combinator Attack and unique
Post: RE: Combinator Attack and unique
The assumption is that the user will deduplicate, if desired. |
|
royce |
hashcat
|
3 |
2,897 |
11-29-2017, 12:27 AM |