Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: edit session settings?
Post: RE: edit session settings?
philsmd's tool here may help:
https://github.com/philsmd/analyze_hc_restore |
|
royce |
General Talk
|
5 |
5,906 |
07-03-2016, 11:19 PM |
|
|
Thread: Hex-Charset cracked, but now what
Post: RE: Hex-Charset cracked, but now what
This may help: https://hashcat.net/forum/thread-3522.html
There is also a hashcat option to show cracks (--show). |
|
royce |
hashcat
|
8 |
11,465 |
09-12-2016, 05:20 PM |
|
|
Thread: How I can make a more efficient bruteforce attack?
Post: RE: How I can make a more efficient bruteforce att...
Take a look at
https://hashcat.net/wiki/doku.php?id=rule_based_attack
The 'd' rule function repeats a word. |
|
royce |
General Talk
|
1 |
3,238 |
08-02-2016, 03:02 PM |
|
|
Thread: Count-words ?
Post: RE: Count-words ?
Closest I could find:
https://github.com/dandavison/ngrams/blob/master/src/count-words.pl |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
5,156 |
08-12-2016, 06:50 AM |
|
|
Thread: Crack a long list efficiently
Post: RE: Crack a long list efficiently
Of course hashcat does this - even if there are different salts. Anything else would be bizarre. |
|
royce |
hashcat
|
10 |
11,851 |
08-13-2016, 04:29 PM |
|
|
Thread: Legacy Hashcat
Post: RE: Legacy Hashcat
[hr]
https://hashcat.net/files_legacy/oclHashcat-2.01.7z
https://hashcat.net/files_legacy/cudaHashcat-2.01.7z
Be aware that if your GPUs are no longer supported by the manufacturer, they are not s... |
|
royce |
hashcat
|
1 |
2,973 |
08-13-2016, 07:39 PM |
|
|
Thread: Dictionary encoding: UTF8 or Win-1252 for German?
Post: RE: Dictionary encoding: UTF8 or Win-1252 for Germ...
Dictionary encoding depends on the encoding used by the software that initially stored the passwords. If the software used UTF-8, hashcat will need to receive UTF-8 strings as source material. If anot... |
|
royce |
General Talk
|
2 |
4,022 |
08-21-2016, 08:49 AM |
|
|
Thread: Initializing device kernels and memory
Post: RE: Initializing device kernels and memory
Could you post your full command line (with any hashes redacted)? One possibility is that one of your command line options isn't in the proper order, such that hashcat is trying to load one of your l... |
|
royce |
hashcat
|
10 |
14,879 |
08-21-2016, 09:12 PM |
|
|
Thread: Initializing device kernels and memory
Post: RE: Initializing device kernels and memory
I'm not an expert in all of the options you're using, but it looks sane overall to me. Is there any CPU or GPU load during that period? And can you confirm that running this commandline directly, rath... |
|
royce |
hashcat
|
10 |
14,879 |
08-22-2016, 12:20 AM |
|
|
Thread: Looking for A Little Push
Post: RE: Looking for A Little Push
It sounds like you've discovered a number of options from your research. What are they? What criteria have you considered for prioritizing them? |
|
royce |
hashcat
|
9 |
10,377 |
08-23-2016, 08:48 PM |
|
|
Thread: Notifications from forum are going to SPAM folder
Post: RE: Notifications from forum are going to SPAM fol...
Assuming that the stated host is the only source, something along these lines would be a starting point:
Code:
--
IN TXT "v=spf1 ip6:2a03:f80:ed15:149:154:152:149:1 ~all"
--
|
|
royce |
General Talk
|
4 |
7,257 |
08-28-2016, 12:51 AM |
|
|
Thread: How to get DES key if I know plain text?
Post: RE: How to get DES key if I know plain text?
DES and 3DES have been implemented:
https://github.com/hashcat/hashcat/commit/71a8459d851d246945343ea59effa1d46b965bf8
Beta binaries are here: https://hashcat.net/beta/ |
|
royce |
hashcat
|
4 |
7,220 |
08-30-2016, 08:18 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil... |
|
royce |
hashcat
|
17 |
24,505 |
08-31-2016, 11:22 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt.
Can you post the full command line you're using? |
|
royce |
hashcat
|
17 |
24,505 |
09-01-2016, 01:23 AM |
|
|
Thread: 2x Nvidia for opencl - SLI link necessary?
Post: RE: 2x Nvidia for opencl - SLI link necessary?
Not necessary - in fact, definitely do not use SLI with hashcat.
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#should_i_attach_crossfire_amdsli_nvidia_bridges |
|
royce |
Hardware
|
2 |
4,057 |
09-08-2016, 09:19 AM |
|
|
Thread: md5(md5($pass)$salt) for hash code 1$
Post: RE: md5(md5($pass)$salt) for hash code 1$
You're mean, radix. 1$ [sic] seemed like a pretty competitive offer to me. ;) |
|
royce |
General Talk
|
2 |
4,191 |
09-11-2016, 05:33 AM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
I don't know of a way to do this with hashcat today.
But the "jumbo" edition of John the Ripper has a "hidden" option (--keep-guessing) that will do this.
For CRC32, the source file has to be asse... |
|
royce |
hashcat
|
9 |
12,021 |
09-11-2016, 06:43 AM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
When using masks, hashcat uses the same sequence of passwords every time.
I haven't read your script thoroughly, but how does the script teach hashcat that it shouldn't just stop at the first one it ... |
|
royce |
hashcat
|
9 |
12,021 |
09-11-2016, 03:55 PM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
Ah, you're using the offset - nice! |
|
royce |
hashcat
|
9 |
12,021 |
09-11-2016, 04:39 PM |
|
|
Thread: Which Graphic Card is better
Post: RE: Which Graphic Card is better
The 670 is based on the Kepler architecture. The 750 Ti is based on Maxwell. The Maxwell architecture is much better for hashcat. Even just one 750 Ti would be better than a 670. And 2 750s would be e... |
|
royce |
hashcat
|
6 |
8,474 |
10-04-2016, 05:33 AM |