Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Need help working with masks
Post: RE: Need help working with masks
We shall speak no more of it. :)
Generally, that's a hybrid attack, word-on-the-left style - hashcat attack mode 6 (-a 6).
Shifting case would be trickier - you'd have to preprocess the wordlist... |
|
royce |
hashcat
|
5 |
2,536 |
02-04-2019, 12:00 AM |
|
|
Thread: Need help with NTLM password case
Post: RE: Need help with NTLM password case
You can create rules that toggle case.
https://blog.didierstevens.com/2016/07/18/practice-ntds-dit-file-part-5-password-cracking-with-hashcat-lm-ntlm/ |
|
royce |
hashcat
|
6 |
5,098 |
03-25-2018, 06:27 PM |
|
|
Thread: NEED HELP WITH HASHCAT
Post: RE: NEED HELP WITH HASHCAT
* You should definitely use hashcat 4.0.1
* Please don't use the word 'dehash'; that's not what any hash-cracking utility does (because it implies reversing a hash, which is by definition impossible
... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
3,125 |
11-19-2017, 01:30 AM |
|
|
Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem
Yeah, it's a normal and understandable intuition. But by design, only trying to hash the entire string will generate a hash that is then compared to the target hash. Once you understand how hashing wo... |
|
royce |
hashcat
|
3 |
2,660 |
05-06-2018, 09:55 PM |
|
|
Thread: need advice
Post: RE: need advice
I'm having trouble figuring out what advice you're looking for; can you rephrase as a specific question? |
|
royce |
hashcat
|
5 |
3,637 |
09-03-2018, 04:37 PM |
|
|
Thread: need advice
Post: RE: need advice
If it's 10 random digits, and there's no other pattern, that's probably the best you can do.
Adding -O / --optimized-kernel-enable might also help. |
|
royce |
hashcat
|
5 |
3,637 |
09-07-2018, 08:09 PM |
|
|
Thread: Need a new hardware to run Hashcat?
Post: RE: Need a new hardware to run Hashcat?
If your card is still supported by latest stable AMD drivers, it should be supported by hashcat. |
|
royce |
hashcat
|
4 |
1,509 |
12-19-2019, 09:27 AM |
|
|
Thread: My private dictionary from hundreds of sources
Post: RE: My private dictionary from hundreds of sources
First, thanks for thinking to contribute!
I don't want to rain on your parade ... but wordlists without attribution can sometimes be problematic. Everyone goes through this phase. ;)
Code:
--
$ wc... |
|
royce |
User Contributions
|
2 |
2,829 |
08-19-2019, 04:40 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
Your example in crackitBruteForce.sh will only match three-digits-per-octet IPs (111.111.111.111) and miss other possibilities (111.111.111.1, 1.1.1.1, 11.11.11.11, etc.)
This is closer: https://pa... |
|
royce |
hashcat
|
13 |
9,515 |
02-26-2018, 02:10 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
Couple of niggles:
- That larger file I linked to covers actual possible IP addresses. Many ?d?d?d (above 254) are invalid in an IP-address octet. So your masks will try many IPs that are not valid... |
|
royce |
hashcat
|
13 |
9,515 |
02-26-2018, 08:15 AM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
I didn't write that paste, just grabbed it because it did the job. :)
Works for me:
Code:
--
# Get the masks file.
$ wget -O ip.masks https://pastebin.com/raw/4HQ6C8gG
[...]
# For effici... |
|
royce |
hashcat
|
13 |
9,515 |
02-27-2018, 05:25 PM |
|
|
Thread: My practice attempt to decrypt a SHA-256 hash of an IP address
Post: RE: My practice attempt to decrypt a SHA-256 hash ...
undeath Wrote: (02-27-2018, 06:29 PM)
--
no, it doesn't. there are no instances of .?1 or .?2
--
That's what I get for not escaping my '?' in my egrep. :) Then I have no idea why the OP got that as... |
|
royce |
hashcat
|
13 |
9,515 |
02-27-2018, 07:03 PM |
|
|
Thread: My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o
Post: RE: My amd gpu hashcat -b -m 17200 can't get the b...
Thanks for masking the hash!
Could you provide the full commandline you're using, and the output that you get (continuing to mask any hashes)? |
|
royce |
hashcat
|
2 |
1,345 |
10-21-2019, 04:18 AM |
|
|
Thread: Multiple masks - repeated sequences
Post: RE: Multiple masks - repeated sequences
Do the math of how many combinations it will actually save you, compared to the total number of combinations.
It's rarely worth the effort to eliminate the relatively small number of duplicates lik... |
|
royce |
hashcat
|
2 |
625 |
05-19-2020, 10:01 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
Huh, I didn't know this. Not sure what is the best way to express this in the --help output, but it feels important enough to try. |
|
royce |
hashcat
|
8 |
3,443 |
08-26-2019, 03:38 PM |
|
|
Thread: Multiple Dictionaries?
Post: RE: Multiple Dictionaries?
Some attack modes do work with a path to a folder. |
|
royce |
hashcat
|
2 |
4,186 |
02-27-2017, 03:02 AM |
|
|
Thread: MS Office NON-ASCII characters
Post: RE: MS Office NON-ASCII characters
Hmm, no strong ideas here yet from me.
Cross-check idea: what method are you using to extract the MS Office hashes? Have you verified your method by setting a simple ASCII password, extracting it, ... |
|
royce |
hashcat
|
2 |
2,072 |
05-21-2018, 05:33 PM |
|
|
Thread: MS Office 2019 hashes
Post: RE: MS Office 2019 hashes
According to this John the Ripper pull request (https://github.com/magnumripper/JohnTheRipper/pull/3460) from @dhiru, they're the same. |
|
royce |
General Talk
|
2 |
2,622 |
11-14-2018, 05:53 PM |
|
|
Thread: Most Efficient KeePass Path of Mix Dictionary and characters
Post: RE: Most Efficient KeePass Path of Mix Dictionary ...
Not much to optimize here; you're the person best positioned to guess what your own password was. SLI is irrelevant (and even contraindicated; I'd remove it and let hashcat manage the GPUs directly). ... |
|
royce |
hashcat
|
1 |
1,488 |
11-10-2018, 07:45 AM |
|
|
Thread: Modify the hash file and continue the attack at the same point
Post: RE: Modify the hash file and continue the attack a...
I'm not aware of a way to do this.
But wouldn't this mean that all of your previous attack wouldn't ever be applied to the new hash? |
|
royce |
hashcat
|
3 |
662 |
06-22-2020, 08:31 PM |