Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: pocl benchmarks
Post: RE: pocl benchmarks
Wow - that is quite interesting - thanks for the stats, hops. Promising for the future - and useful even today for people with specific attack needs. |
|
royce |
hashcat
|
1 |
2,405 |
05-02-2018, 04:36 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?
Looks like this is the same as:
https://github.com/magnumripper/JohnTheRipper/pull/3240
... so John the Ripper (jumbo edition) may have it soon? |
|
royce |
hashcat
|
5 |
5,005 |
05-02-2018, 06:16 PM |
|
|
Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem
Yeah, it's a normal and understandable intuition. But by design, only trying to hash the entire string will generate a hash that is then compared to the target hash. Once you understand how hashing wo... |
|
royce |
hashcat
|
3 |
2,661 |
05-06-2018, 09:55 PM |
|
|
Thread: HashCat takes a very long time to report progress
Post: RE: HashCat takes a very long time to report progr...
I wouldn't say by design - but I have no idea if this longer delay is "fixable" or a natural consequence of the approach. My understanding is that there's some development discussion going on about it... |
|
royce |
hashcat
|
5 |
8,314 |
05-06-2018, 09:56 PM |
|
|
Thread: Graphic card or cloud computing
Post: RE: Graphic card or cloud computing
This depends on your use case.
If you have a one-time cracking job that will only take a few hours or days, then the cloud makes more sense.
If you intend to have longer-running jobs, or multipl... |
|
royce |
hashcat
|
3 |
1,505 |
10-11-2019, 07:34 AM |
|
|
Thread: trouble with samdump2
Post: RE: trouble with samdump2
Posting real hashes is against the forum rules.
The hashes above are special LM and NTLM hashes that indicate an empty/non-set password.
If you're using something called a "Free password hash cr... |
|
royce |
General Talk
|
2 |
2,742 |
05-09-2018, 04:14 PM |
|
|
Thread: Cooling
Post: RE: Cooling
It sounds like you need to improve airflow in the case, or move the system to a cooler room (or both). Running cards hot is a gamble, and I'd concentrate on getting the cooling resolved rather than gu... |
|
royce |
hashcat
|
10 |
7,557 |
05-09-2018, 04:36 PM |
|
|
Thread: insert a character after each character
Post: RE: insert a character after each character
Yep, that's pretty much the way to do it. Use hashcat's "--stdout" feature to test to see if it's working like you're expecting. |
|
royce |
General Talk
|
2 |
2,529 |
05-10-2018, 07:13 AM |
|
|
Thread: pass:hash output for every candidate
Post: RE: pass:hash output for every candidate
Hmm. If hashcat creates different hashes for the same candidates (assuming the same salt), that would be a pretty serious bug.
Generally speaking, you might be able to figure something out using ha... |
|
royce |
hashcat
|
5 |
3,431 |
05-10-2018, 03:34 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
cryptozin, please don't hijack threads. If you have a different question, please start a new thread. |
|
royce |
hashcat
|
16 |
9,777 |
05-12-2018, 03:56 PM |
|
|
Thread: Solution to use very large wordlist
Post: RE: Solution to use very large wordlist
Discussion of speed needs to know what type of hash is the target. Either:
A) your attack is malformed (can you post your syntax, omitting any real hashes?), or
b) it's a pretty fast hash and y... |
|
royce |
hashcat
|
4 |
3,817 |
05-12-2018, 03:53 PM |
|
|
Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM
Nice catch/answer, undeath |
|
royce |
User Contributions
|
18 |
36,655 |
05-12-2018, 07:18 PM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
It's after the official period of the challenge, but since people could theoretically keep working on it ...
If you post the syntax you were using, we might be able to help. The hashcat hash mode i... |
|
royce |
General Talk
|
9 |
7,198 |
05-12-2018, 07:22 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help
Not much to go on to help you here.
Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a... |
|
royce |
hashcat
|
16 |
9,777 |
05-13-2018, 04:00 AM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
Proof of concept:
Code:
--
# Convert salt and hash from hex to raw and then to base64:
$ echo -n '00bb202b205f064e30f6fae101162a2e' | xxd -p -r | base64
ALsgKyBfBk4w9vrhARYqLg==
$ echo -n '919... |
|
royce |
General Talk
|
9 |
7,198 |
05-13-2018, 09:42 PM |
|
|
Thread: [ANSWERED] New user, custom brute force help
Post: RE: [ANSWERED] New user, custom brute force help
Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore. |
|
royce |
hashcat
|
16 |
9,777 |
05-14-2018, 12:59 AM |
|
|
Thread: Mode 7 (Hybrid Mask + Wordlist) only using 1 GPU?
Post: RE: Mode 7 (Hybrid Mask + Wordlist) only using 1 G...
There is an asymmetry in left-hand-side vs right-hand-side work capabilities. See
https://hashcat.net/forum/thread-1276-post-6965.html#pid6965 |
|
royce |
hashcat
|
1 |
2,062 |
05-14-2018, 04:44 PM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
Yep. The only way to make real progress on it would be if multiple teams with lots of cards all cooperated. Which would itself be pretty cool, IMO. |
|
royce |
General Talk
|
9 |
7,198 |
05-14-2018, 04:45 PM |
|
|
Thread: Introduction
Post: RE: Introduction
Welcome! Interesting thread idea - we'll see if it takes root! |
|
royce |
General Talk
|
2 |
2,625 |
05-17-2018, 05:41 AM |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
So I guess the answer to your question is "no"? :P :)
Sounds reproducible, so good catch. The steps necessary to reproduce, in a GitHub issue, would make this actionable. |
|
royce |
hashcat
|
13 |
32,462 |
05-17-2018, 05:43 AM |