Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Cyrillic --> English transliterated passwords wordlist
Post: RE: Cyrillic --> English transliterated passwords ...
RealEnder, wlc was new to me - thanks for the tip, looks very useful. |
|
royce |
hashcat
|
7 |
6,887 |
12-01-2017, 05:45 PM |
|
|
Thread: custom workload
Post: RE: custom workload
What is the use case? If you're trying to make a set of attacks more efficient for a given period of time, you'd be better off running the first attack for 20% of your timeframe, the second for 30%, a... |
|
royce |
hashcat
|
6 |
5,311 |
05-10-2017, 09:56 PM |
|
|
Thread: custom workload
Post: RE: custom workload
Interesting. I'm not familiar with a way to divide up hashcat's resources in this way.
The only workaround that I know of would be to use --session and --restore for each of the three instances, and... |
|
royce |
hashcat
|
6 |
5,311 |
05-10-2017, 11:23 PM |
|
|
Thread: Custom Wordlist Concatentation
Post: RE: Custom Wordlist Concatentation
Welcome!
Unless it is an extremely slow hash, or the wordlists are much larger than the example that you're giving, I would just use princeprocessor (https://github.com/hashcat/princeprocessor) to... |
|
royce |
General Talk
|
6 |
5,673 |
10-30-2017, 03:23 AM |
|
|
Thread: Custom Wordlist Concatentation
Post: RE: Custom Wordlist Concatentation
princeprocessor can generate all possible combinations so quickly, and hashcat can (usually) use them so quickly, there's no real value in trying to narrow down the range of possibilities.
Code:
--
... |
|
royce |
General Talk
|
6 |
5,673 |
10-30-2017, 03:50 AM |
|
|
Thread: Custom Wordlist Concatentation
Post: RE: Custom Wordlist Concatentation
You're welcome!
OK, I added a little more content to that wiki page, which should hopefully help the next person, anyway. :) Thanks for the nudge! |
|
royce |
General Talk
|
6 |
5,673 |
10-30-2017, 04:04 AM |
|
|
Thread: Custom rule for 8Track hashes
Post: RE: Custom rule for 8Track hashes
Put that other rule in a separate file, and then try
Code:
--
-r best64.rule -r 8track.rule
--
The rules are applied in the order specified, so order on the command line matters:
Code:
--
$ e... |
|
royce |
hashcat
|
2 |
2,766 |
06-16-2018, 09:53 PM |
|
|
Thread: Custom mask generator
Post: RE: Custom mask generator
Most of what you're looking to do can be accomplished with the PACK toolkit:
https://github.com/iphelix/pack
The 'policygen' tool can help generate masks with arbitrary policies (and they won't ... |
|
royce |
hashcat
|
11 |
5,302 |
12-26-2019, 03:45 AM |
|
|
Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...
There's no single mask. You have to generate a *list of masks*.
You can do this with policygen from the PACK toolkit.
https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-... |
|
royce |
hashcat
|
2 |
1,220 |
08-18-2019, 06:24 PM |
|
|
Thread: Custom mask
Post: RE: Custom mask
Can you provide an artificial example - one that illustrates your question, but isn't the one you're actually looking for? |
|
royce |
hashcat
|
3 |
636 |
07-22-2020, 05:48 AM |
|
|
Thread: Custom mask
Post: RE: Custom mask
If you're unsure what the leet options are, toggling them all can be quite keyspace-intensive. You can do it with custom masks, trivial example:
-1 a@ -2 3e F?1k?2
... but you can only use four ... |
|
royce |
hashcat
|
3 |
636 |
07-22-2020, 06:23 PM |
|
|
Thread: Custom charset, I'm lost...
Post: RE: Custom charset, I'm lost...
You can supply a custom charset using --custom-charset[1-4] files. The ./charsets/ directory has some stock ones, including the ./charsets/standard/German/ directory. You can combine up to four multip... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
8,360 |
10-07-2016, 05:47 PM |
|
|
Thread: custom charset help
Post: RE: custom charset help
Some of the characters are interpreted by your command shell - you might have to backslash one or more of the characters that have special meaning in the shell, such as !, $, ', ", etc.
But in your c... |
|
royce |
hashcat
|
4 |
270 |
09-23-2020, 07:30 AM |
|
|
Thread: custom charset help
Post: RE: custom charset help
Huh - when I run it, the memory requirement looks pretty small:
Code:
--
Host memory required for this attack: 228 MB
--
Also FYI, hashcat will throw an integer overflow for this attack at ?a ... |
|
royce |
hashcat
|
4 |
270 |
09-23-2020, 07:53 AM |
|
|
Thread: csv output for benchmarking
Post: RE: csv output for benchmarking
There is also:
hashcat -b --machine-readable |
|
royce |
User Contributions
|
1 |
3,940 |
02-19-2017, 03:45 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
Crunch is unnecessary for most attacks:
* Limiting duplicate characters is not worth the sacrifice in speed
* Resumption of candidate generation is built in natively to hashcat
Generating candi... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 05:19 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - c... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 04:55 PM |
|
|
Thread: Create custom dictionary
Post: RE: Create custom dictionary
Welcome!
Instead of generating a custom dictionary, you're looking for a hybrid or rules-based attack, I think. With these attacks, each word in your dictionary is dynamically modified many times,�... |
|
royce |
hashcat
|
8 |
13,923 |
04-25-2017, 03:02 PM |
|
|
Thread: Create custom dictionary
Post: RE: Create custom dictionary
Good question, jallis.
devilman666, since the order is always the same, the example that I provided should apply to your case. |
|
royce |
hashcat
|
8 |
13,923 |
04-25-2017, 03:46 PM |
|
|
Thread: Cracking Turkish/Foreign Hashes
Post: RE: Cracking Turkish/Foreign Hashes
What MD5 is your Python producing? I get:
Code:
--
$ echo -n 'ĞĞ' | md5sum
411019a0840fad007398bcab6cc9188c -
--
... which hashcat cracks, using your syntax:
Code:
--
$ hashcat --... |
|
royce |
hashcat
|
2 |
2,375 |
05-21-2018, 12:41 AM |