Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Password cracking guidance
Post: RE: Password cracking guidance
The magic word you're missing is "LUKS".
This should yield a few reasonable howtos:
https://www.google.com/search?q=LUKS+hashcat |
|
royce |
hashcat
|
1 |
1,241 |
08-06-2019, 05:05 AM |
|
|
Thread: Password Hash Identification
Post: RE: Password Hash Identification
Read the forum rules: https://hashcat.net/forum/archive/index.php?announcement-2.html
I've redacted your hash. If you have a specific question about using hashcat, ask it.
Also be aware that pas... |
|
royce |
hashcat
|
1 |
572 |
05-01-2020, 07:55 AM |
|
|
Thread: Password list
Post: RE: Password list
logistix111 Wrote: (12-06-2017, 05:19 PM)
--
Thanks! One of the things I didn't like about other lists is they contained the hash too which is a PITA to remove and clean up.
--
Find a way to do this ... |
|
royce |
hashcat
|
6 |
15,311 |
12-06-2017, 08:52 PM |
|
|
Thread: Passwords
Post: RE: Passwords
Being self-taught can be rewarding. With just a little bit of reading (hashcat FAQ, some examples/demos on YouTube), you can get the basics down pretty quickly. |
|
royce |
General Talk
|
1 |
3,322 |
11-19-2017, 03:03 AM |
|
|
Thread: Passwords13 Las Vegas CFP
Post: RE: Passwords13 Las Vegas CFP
[scavenging for unanswered posts, no need to reply]
For what it's worth, here's a link to all of the talks that were accepted. :)
https://www.youtube.com/playlist?list=PLdIqs92nsIzTphHrDlIucuMP2... |
|
royce |
General Talk
|
3 |
8,278 |
11-19-2017, 03:13 AM |
|
|
Thread: Passwords14 - Presentation slides
Post: RE: Passwords14 - Presentation slides
Cool, thanks!
Note that due to some directory reorganization, this is now at
https://hashcat.net/events/p14-vegas/ |
|
royce |
Organisation and Events
|
1 |
6,108 |
11-19-2017, 03:37 AM |
|
|
Thread: Passwords^13 - Bergen - December 2-3
Post: RE: Passwords^13 - Bergen - December 2-3
YouTube playlist of all videos from the conference are here (https://www.youtube.com/watch?v=DwbvFQx0Vfk&list=PLdIqs92nsIzQL6_ZTXTDPvhE7GiZrl-Em). |
|
royce |
Organisation and Events
|
2 |
10,974 |
11-29-2017, 06:03 AM |
|
|
Thread: Pause Certain Devices
Post: RE: Pause Certain Devices
There's no interactive native way to do this today.
You could work around this by scripting something that does the following:
1. Stop the job.
2. Modify the restore file using https://github.c... |
|
royce |
hashcat
|
1 |
1,673 |
03-31-2018, 03:45 AM |
|
|
Thread: Pause/ resume with different dictionary
Post: RE: Pause/ resume with different dictionary
I don't know that there's a lot of value in changing the dictionary midstream. If you are 10M lines into your current dictionary when the restore file is updated, and then you quit, change the diction... |
|
royce |
hashcat
|
2 |
3,245 |
03-29-2017, 02:15 PM |
|
|
Thread: PBKDF2-SHA512 (Hash type 7100) Command Syntax
Post: RE: PBKDF2-SHA512 (Hash type 7100) Command Syntax
Attack mode '0' (-a 0) is the "straight" / dictionary attack.
Running
Code:
--
hashcat --help
--
... at the bottom, you'll see an example:
Code:
--
Wordlist | $P$ | hashcat -a 0 -m... |
|
royce |
hashcat
|
1 |
3,143 |
06-05-2017, 07:29 AM |
|
|
Thread: PeopleSoft with salt
Post: RE: PeopleSoft with salt
The salt is intrinsic to the hash. The only way to rework the salts would be if you already had the plain text password. |
|
royce |
hashcat
|
3 |
4,401 |
06-13-2017, 05:21 PM |
|
|
Thread: personal wrapper script that got out of hand, 'hashcrack'
Post: RE: personal wrapper script that got out of hand, ...
Interesting - thanks for the contribution! |
|
royce |
User Contributions
|
1 |
1,217 |
01-07-2020, 12:10 AM |
|
|
Thread: PKCS5S2 hash supported
Post: RE: PKCS5S2 hash supported
This appears to be an Atlassian-specific hash?
https://stackoverflow.com/questions/26175391/how-to-match-crowd-database-passwords
hashcat doesn't currently support this hash type that I'm aware ... |
|
royce |
hashcat
|
1 |
3,674 |
11-19-2017, 02:38 AM |
|
|
Thread: please add PuTTY private key cracker ! thx
Post: RE: please add PuTTY private key cracker ! thx
Have you considered atom's suggestion above? |
|
royce |
hashcat
|
3 |
6,345 |
04-26-2018, 07:01 AM |
|
|
Thread: Please Help!!
Post: RE: Please Help!!
Please read the forum rules.
https://hashcat.net/forum/announcements.php?aid=2 |
|
royce |
hashcat
|
1 |
799 |
12-31-2019, 06:34 PM |
|
|
Thread: pocl benchmarks
Post: RE: pocl benchmarks
Wow - that is quite interesting - thanks for the stats, hops. Promising for the future - and useful even today for people with specific attack needs. |
|
royce |
hashcat
|
1 |
2,405 |
05-02-2018, 04:36 PM |
|
|
Thread: Possible to do attack mode 6 and 7 on same attack
Post: RE: Possible to do attack mode 6 and 7 on same att...
Assuming the syntax is correct, that would indeed work - it would be slower than a direct on-GPU implementation, but a good compromise solution. |
|
royce |
hashcat
|
6 |
5,306 |
12-20-2017, 08:34 AM |
|
|
Thread: Possible to do attack mode 6 and 7 on same attack
Post: RE: Possible to do attack mode 6 and 7 on same att...
No - stdout leaves the hashcat process entirely, and there is no in-hashcat method for this today (other than, perhaps, generating a *very* large list of masks using maskprocessor:
Simplified PoC:
... |
|
royce |
hashcat
|
6 |
5,306 |
12-20-2017, 05:00 PM |
|
|
Thread: Possible to do attack mode 6 and 7 on same attack
Post: RE: Possible to do attack mode 6 and 7 on same att...
I think that you've got all of the possible pieces already, and you just need to arrange them with the trade-off that works best for you. It looks like appending or prepending ?a?a with rules as the f... |
|
royce |
hashcat
|
6 |
5,306 |
12-25-2017, 09:06 PM |
|
|
Thread: Potfile format - to hex or not to hex
Post: RE: Potfile format - to hex or not to hex
FWIW, I've been using that same Perl one-liner from undeath, expanded for readability and converted to a standalone script:
Code:
--
#!/usr/bin/env perl
# Credit: undeath, https://hashcat.net... |
|
royce |
hashcat
|
10 |
9,895 |
03-15-2017, 03:02 PM |