Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
From the PM, it looks like you'd benefit from doing what philsmd described - using the 'skip' and 'limit' options to split the job across two nodes.
philsmd, I'm actually not aware of a simple tutori... |
|
royce |
hashcat
|
9 |
1,576 |
04-26-2020, 04:48 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
To fully take advantage of GPU for a fast hash like MD5, you have to have more than a few rules.
You might try emulating a hybrid attack with generated rules.
https://hashcat.net/wiki/doku.php?i... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 04:50 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Yeah, like I said in my edit - it doesn't work like I was hoping it would. I don't have a better answer yet.
But notice that what I was trying to do - generate some of the word on GPU with a large ... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:32 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
OK, this is ugly as heck, and buggy (it doesn't fully emulate bruteforce for the last two characters), but it's getting close:
Code:
--
$ for item in `mp64 '?aTEMP?a'`; do echo "di6${item}iE${it... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 06:20 AM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
I'm guessing ... but if I had to say, it's probably that in practice, most attacks are possible without it (by chaining stuff together, Unix-style) - so adding it internally could (arguably) add unnec... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 05:43 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
Man, I thought I tried that and it didn't work. But I checked and it was failing for other syntax reasons.
So:
Code:
--
$ cat double.rule
d
$ mp64 '$?a$?a' >append-aa.rule
$ head appen... |
|
royce |
hashcat
|
14 |
14,530 |
11-22-2017, 08:33 PM |
|
|
Thread: Bruteforce + rules
Post: RE: Bruteforce + rules
You might try increasing the number of masks, to see if that improves performance.
But generally speaking, I suspect that full bruteforce has some attack-specific optimizations that make it pretty ... |
|
royce |
hashcat
|
14 |
14,530 |
11-23-2017, 06:18 AM |
|
|
Thread: Bruteforce + Custom characters
Post: RE: Bruteforce + Custom characters
If the first 8 characters are truly unknown, then the first 8 positions of the mask would be ?a, and the rest would be literal / hard-coded:
?a?a?a?a?a?a?a?aAlis-ZA |
|
royce |
hashcat
|
1 |
1,857 |
02-17-2018, 06:27 PM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit:
https://github.com/iphelix/pack/... |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 04:04 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
Yep. That's what will take 49 years. :) |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 10:35 AM |
|
|
Thread: Brute-Force custom character
Post: RE: Brute-Force custom character
Following up from your other deleted post, in which you said there are exactly 8 upper and 5 digits.
There are probably too many combinations to reasonably exhaust, but to model how many masks woul... |
|
royce |
hashcat
|
2 |
792 |
05-20-2020, 04:07 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
And if you need it before it's added to hashcat, you'll have to fall back to other tools. John the Ripper supports it with a dynamic mode (CPU only):
Code:
--
Format label ... |
|
royce |
hashcat
|
8 |
6,868 |
02-17-2018, 07:21 PM |
|
|
Thread: Brute Force- Mask,ntml hash?
Post: RE: Brute Force- Mask,ntml hash?
There is no way to determine the length of a plaintext from the hash. This is true for all hashes, and is by design. You cannot know the length until you have cracked it.
You can use other informat... |
|
royce |
hashcat
|
1 |
2,734 |
10-05-2016, 05:40 PM |
|
|
Thread: Brain working slow!!!
Post: RE: Brain working slow!!!
Yes, especially with fast hashes like MD5, a slow Internet connection definitely makes a difference. I speak from Alaskan experience. :)
You might switch to only using --brain-client-features=2, so... |
|
royce |
General Talk
|
4 |
3,280 |
11-10-2018, 11:48 PM |
|
|
Thread: Brain behavior
Post: RE: Brain behavior
The target hashlist does have to be file-checksum-level identical, IIRC. But I'm not positive. But it also shouldn't be very hard to create a very simple test case to verify it directly. |
|
royce |
hashcat
|
4 |
2,815 |
12-08-2018, 03:41 AM |
|
|
Thread: Brain as a centralized potfile?
Post: RE: Brain as a centralized potfile?
1. Yes. All candidates are centrally reported and indexed. For slow hashes, this is effective, because it allows all clients to skip those candidates. For fast hashes, this will quickly bottleneck the... |
|
royce |
hashcat
|
3 |
2,094 |
12-16-2018, 10:28 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil... |
|
royce |
hashcat
|
17 |
24,506 |
08-31-2016, 11:22 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt.
Can you post the full command line you're using? |
|
royce |
hashcat
|
17 |
24,506 |
09-01-2016, 01:23 AM |
|
|
Thread: BLAKE2
Post: RE: BLAKE2
259.4 MH/s on my 750 Ti. ;)
(That's with -O and -w 4.) |
|
royce |
hashcat
|
4 |
3,133 |
11-11-2018, 03:38 PM |
|
|
Thread: Bitslice status and broken nvcc
Post: RE: Bitslice status and broken nvcc
Can the source be reduced to a minimal test case, suitable for sharing with the nvcc team? |
|
royce |
General Talk
|
16 |
25,329 |
10-25-2015, 07:40 AM |