Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Single 15 char NTLM Hash with known info
Post: RE: Single 15 char NTLM Hash with known info
You can use whatever rules make sense for your target. You may have to experiment with --stdout to determine whether the combination of --case-permute and your rules are doing what you're expecting. |
|
royce |
General Talk
|
4 |
3,365 |
01-01-2018, 10:02 PM |
|
|
Thread: show.log
Post: RE: show.log
Unless your command line is customizing the name of the session with --session=show, I don't think hashcat is directly generating this file. |
|
royce |
hashcat
|
6 |
3,651 |
05-24-2018, 08:43 AM |
|
|
Thread: show.log
Post: RE: show.log
Without giving away any sensitive information, can you describe or post what the contents of that file are? |
|
royce |
hashcat
|
6 |
3,651 |
05-24-2018, 03:12 PM |
|
|
Thread: show.log
Post: RE: show.log
Yep, that's a hashcat log file all right. I swear it's acting like you ran something like this:
hashcat --session=show [etc]
That's the only way I know of to get hashcat to save its log file som... |
|
royce |
hashcat
|
6 |
3,651 |
05-26-2018, 10:44 PM |
|
|
Thread: Show which dictionary cracked the hash.
Post: RE: Show which dictionary cracked the hash.
Looking through the dictionaries won't tell you which rule was used.
For future work, or if you want to run your job again, check out --debug-mode. Mode 4 may be what you're looking for. This won't... |
|
royce |
hashcat
|
10 |
11,484 |
10-17-2016, 03:37 PM |
|
|
Thread: Show how the password was cracked
Post: RE: Show how the password was cracked
See the --debug-mode option. Mode 4 may be what you're looking for.
# | Format
===+========
1 | Finding-Rule
2 | Original-Word
3 | Original-Word:Finding-Rule
4 | Original-Word:Finding-Rule:... |
|
royce |
hashcat
|
2 |
2,863 |
03-20-2017, 05:20 PM |
|
|
Thread: Should I be using a rule instead?
Post: RE: Should I be using a rule instead?
There's no way for a single mask to express optional characters (that I'm aware of).
But if you pass a file containing the masks, they are processed in succession very quickly. |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
1,925 |
09-25-2019, 06:21 PM |
|
|
Thread: Should I be using a rule instead?
Post: RE: Should I be using a rule instead?
Good point! True for this particular case, but not the more general case. :P ;) |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
1,925 |
09-25-2019, 10:42 PM |
|
|
Thread: SHA512 Linux
Post: RE: SHA512 Linux
That looks about right, given your card. sha512 is a slow hash.
Code:
--
cudaHashcat v1.38 starting in benchmark-mode...
Device #1: GeForce GTX 970, 4095MB, 1316Mhz, 13MCU
Device #2: GeFor... |
|
royce |
Old oclHashcat Support
|
2 |
4,182 |
11-08-2015, 07:18 PM |
|
|
Thread: SHA256 (AuthMe)
Post: RE: SHA256 (AuthMe)
This type is present in the beta version, not yet released.
https://hashcat.net/beta/
Or you can wait until the release. |
|
royce |
hashcat
|
2 |
1,085 |
01-25-2020, 07:35 PM |
|
|
Thread: Sha224?
Post: RE: Sha224?
Code:
--
$ hashcat -V
v4.0.1
$ hashcat --help | egrep -i 'sha.*22'
1300 | SHA-224
--
|
|
royce |
hashcat
|
1 |
2,456 |
11-19-2017, 02:44 AM |
|
|
Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!
That format has more fields, separated by asterisks, than your hash.
If you try your attack against this example hash from hashcat wiki has more fields:
$itunes_backup$*10*8b715f516ff8e64442c478... |
|
royce |
hashcat
|
3 |
11,612 |
04-13-2018, 04:48 PM |
|
|
Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!
Does your attack work against the example hash? If so, the problem is probably your hash. Double-check to ensure that the field count is identical. |
|
royce |
hashcat
|
3 |
11,612 |
04-14-2018, 05:13 AM |
|
|
Thread: Separator unmatched when using example hash
Post: RE: Separator unmatched when using example hash
Hashes containing '$' need to be enclosed in single quotes on the Unix commandline. This is because $[string] is a way to do variable substitution in bash and related shells.
Once you fix that, you ... |
|
royce |
hashcat
|
2 |
8,713 |
03-16-2019, 08:10 PM |
|
|
Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...
And if it needs to be more than two words wide, you can do something crude like this:
https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2 |
|
royce |
hashcat
|
3 |
1,428 |
09-04-2019, 02:41 PM |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
Example method - script by atom.
Code:
--
#!/usr/bin/perl
use strict;
use warnings;
use MIME::Base64;
while (my $line = )
{
chomp $line;
my @data = split '\$', $line;
if ($data[5] ne 64)
... |
|
royce |
hashcat
|
2 |
1,189 |
08-14-2019, 04:15 PM |
|
|
Thread: Save all valid password candidates
Post: RE: Save all valid password candidates
You can use --stdout to see what candidates hashcat will generate.
Code:
--
$ echo -n hashcat | hashcat --stdout -r ./rules/best64.rule | head
hashcat
tachsah
HASHCAT
Hashcat
hashcat0
hash... |
|
royce |
General Talk
|
6 |
4,520 |
06-17-2018, 05:54 PM |
|
|
Thread: Save all valid password candidates
Post: RE: Save all valid password candidates
Verify your syntax using an existing format. If it works for that, it should work for yours. |
|
royce |
General Talk
|
6 |
4,520 |
06-19-2018, 12:44 AM |
|
|
Thread: Salted vs Unsalted SHA-512
Post: RE: Salted vs Unsalted SHA-512
If you mean simple salting (and not salting+stretching like sha512crypt), then performance scales directly with the keyspace of the salt.
The attack has to try all possible salts. If the salt spac... |
|
royce |
General Talk
|
2 |
2,404 |
07-04-2018, 06:59 PM |
|
|
Thread: sagitta.pw, is it legit?
Post: RE: sagitta.pw, is it legit?
By "it" do you mean Hashstack, their software?
You only get it if you also buy their hardware. |
|
royce |
Hardware
|
5 |
3,070 |
03-31-2019, 04:53 AM |