Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...
TL, Dr. ;)
To summarize: you are cracking an iTunes backup (probably the newer -m 14800, >= 10.0 version) on a single GTX 970, and you're looking for better options.
On the spectrum of dictionar... |
|
royce |
hashcat
|
8 |
5,899 |
05-30-2018, 04:11 AM |
|
|
Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...
You might first try a dictionary like rockyou.txt, which has a number of common passwords, in case it was something simple.
After that, there are some decent howtos out there for growing your hashc... |
|
royce |
hashcat
|
8 |
5,899 |
05-30-2018, 04:35 AM |
|
|
Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...
Hey, can you explain a bit more about what you meant by "input problems" with the device? Is it possible that the password might be something like one of your suspected passwords, but with letters mis... |
|
royce |
hashcat
|
8 |
5,899 |
05-30-2018, 05:00 AM |
|
|
Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...
Self-interest is the sauce of self-motivated learning. ;)
Glad there was a happy ending to this one - congratulations! |
|
royce |
hashcat
|
8 |
5,899 |
06-06-2018, 04:03 PM |
|
|
Thread: First Cracking Rig
Post: RE: First Cracking Rig
I hadn't seen that case before - interesting form factor. If you intend to run long jobs, make sure that your cooling of the room itself is adequate.
I haven't done the math, but 2x1600 PSUs seems ... |
|
royce |
Hardware
|
19 |
10,139 |
02-19-2019, 05:29 PM |
|
|
Thread: First Cracking Rig
Post: RE: First Cracking Rig
Since mining has dropped off a bit, you can probably pick up some of the higher-end multi-PCIe boards for pretty cheap. Some examples:
https://bitcoin.zorinaq.com/many_pcie/
Some attacks are happier ... |
|
royce |
Hardware
|
19 |
10,139 |
02-19-2019, 05:49 PM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
I don't know of a way to do this with hashcat today.
But the "jumbo" edition of John the Ripper has a "hidden" option (--keep-guessing) that will do this.
For CRC32, the source file has to be asse... |
|
royce |
hashcat
|
9 |
12,023 |
09-11-2016, 06:43 AM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
When using masks, hashcat uses the same sequence of passwords every time.
I haven't read your script thoroughly, but how does the script teach hashcat that it shouldn't just stop at the first one it ... |
|
royce |
hashcat
|
9 |
12,023 |
09-11-2016, 03:55 PM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
Ah, you're using the offset - nice! |
|
royce |
hashcat
|
9 |
12,023 |
09-11-2016, 04:39 PM |
|
|
Thread: Finding Algo/Hash Type
Post: RE: Finding Algo/Hash Type
It's not open source, but it's free to use.
Note also that I've removed the hashes from your post - posting full hashes with non-known plains is against the forum rules. |
|
royce |
hashcat
|
3 |
2,624 |
11-10-2018, 01:39 AM |
|
|
Thread: Finding Algo/Hash Type
Post: RE: Finding Algo/Hash Type
In general, the only way to tell for sure is to crack one.
Other tools like MDXfind are good at tackling many different algos at once against a pile of unknown hashes. hashcat and MDXfind have some... |
|
royce |
hashcat
|
3 |
2,624 |
11-09-2018, 11:05 PM |
|
|
Thread: find missing characters from my private key
Post: RE: find missing characters from my private key
If there are 32 random characters missing, there is no way to bruteforce that space in our lifetimes. |
|
royce |
hashcat
|
5 |
4,355 |
05-31-2018, 06:24 PM |
|
|
Thread: Fibonacci rules?
Post: RE: Fibonacci rules?
I would expect that a general hybrid attack (that tries a variety of number combinations, not just Fibonacci) would almost always be the way to go here. Unless maybe it was A) a very slow hash, and B)... |
|
royce |
User Contributions
|
1 |
5,011 |
11-19-2017, 03:30 AM |
|
|
Thread: Few wordlist processing utilities
Post: RE: Few wordlist processing utilities
Cool - especially the mutators, thanks! (The others are mostly covered by tools in hashcat-utils and/or PACK, I think) |
|
royce |
User Contributions
|
1 |
5,099 |
11-19-2017, 03:36 AM |
|
|
Thread: fast method for merging cracked hashes with original data
Post: RE: fast method for merging cracked hashes with or...
This shouldn't be particularly slow - how slow are we talking? |
|
royce |
General Talk
|
1 |
2,400 |
11-19-2017, 02:54 AM |
|
|
Thread: Fan control in Linux
Post: RE: Fan control in Linux
Hey, did you ever find out a good solution for this for you? |
|
royce |
Hardware
|
2 |
3,930 |
11-19-2017, 03:27 AM |
|
|
Thread: False Positives
Post: RE: False Positives
Depends on what you mean by "false positive". :)
For some hash types, hashcat will automatically show all collisions that it discovers. (You can also get this behavior for other hash types with --k... |
|
royce |
hashcat
|
3 |
658 |
06-16-2020, 04:03 PM |
|
|
Thread: Extracting Hashes
Post: RE: Extracting Hashes
This varies depending on the hash type. But generally, the John the Ripper tools are usually quite good - and up to date for many hash types. |
|
royce |
General Talk
|
1 |
1,866 |
06-19-2018, 08:04 AM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified.
It defaults to this mask:
-1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d |
|
royce |
hashcat
|
11 |
2,910 |
09-21-2019, 06:42 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max. |
|
royce |
hashcat
|
11 |
2,910 |
09-21-2019, 06:50 PM |