Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: USER:HASH
Post: RE: USER:HASH
Ah, if you're asking whether you can customize the realtime output as the cracks *are actually occurring*, I'm not aware of a way to do that. But tailing the output file in a separate window will have... |
|
royce |
hashcat
|
8 |
6,548 |
02-04-2018, 08:29 PM |
|
|
Thread: USER:HASH
Post: RE: USER:HASH
Yes, that's *exactly* what the link I sent you does. Please study it more closely.
First, crack, using --username so that usernames are understood in the target hash file:
Code:
--
$ cat test... |
|
royce |
hashcat
|
8 |
6,548 |
02-04-2018, 02:05 AM |
|
|
Thread: Combinator Attack issue with rules
Post: RE: Combinator Attack issue with rules
Just a guess, but you could try combinator3 and then tack on four digits with rules ( [wordlist] [4digitwordlist] [wordlist] ?d?d?d?d) |
|
royce |
hashcat
|
10 |
6,617 |
07-08-2018, 06:51 AM |
|
|
Thread: Combinator Attack issue with rules
Post: RE: Combinator Attack issue with rules
No - rather, you'd pipe the output from combinator to hashcat, and use hashcat to apply the ?d?d?d?d rule |
|
royce |
hashcat
|
10 |
6,617 |
07-08-2018, 07:23 PM |
|
|
Thread: Combinator Attack issue with rules
Post: RE: Combinator Attack issue with rules
I was being loose with the vocab again, but from the thread I thought that he was going to be using a rule to simulate a hybrid attack. |
|
royce |
hashcat
|
10 |
6,617 |
07-09-2018, 04:33 PM |
|
|
Thread: Combinator Attack issue with rules
Post: RE: Combinator Attack issue with rules
undeath Wrote: (07-09-2018, 05:01 PM)
--
There is not "a rule" to simulate a hybrid attack ;)
--
I didn't mean to imply that all you needed was a ruleset in order to do so. |
|
royce |
hashcat
|
10 |
6,617 |
07-09-2018, 11:39 PM |
|
|
Thread: 3DES Is there a problem? where did I go wrong ?
Post: RE: 3DES Is there a problem? where did I go wrong ...
No. Do the math (seriously, as in do the actual calculation of multiplying hashes per second by the number of hashes, using something like Wolfram Alpha) so that you understand why it's literally impo... |
|
royce |
hashcat
|
11 |
6,630 |
11-11-2018, 03:32 PM |
|
|
Thread: mask help
Post: RE: mask help
You'll need to be realistic about your odds. You can improve them a bit, but it will take some work.
Office 2013 hashes are extremely slow. On my GTX 970, I only get about 4000 hashes per second ... |
|
royce |
hashcat
|
6 |
6,636 |
02-17-2017, 06:45 PM |
|
|
Thread: mask help
Post: RE: mask help
When incrementing, your mask needs to be as long as your increment maximum, so your syntax needs to be adjusted accordingly:
?d?l?l?l?l?l?l?l
And yes, anything you can do to narrow it down will ... |
|
royce |
hashcat
|
6 |
6,636 |
02-19-2017, 04:42 PM |
|
|
Thread: --restore with the change of workload profile?
Post: RE: --restore with the change of workload profile?
This may help: https://github.com/philsmd/analyze_hc_restore |
|
royce |
hashcat
|
4 |
6,657 |
02-24-2017, 01:15 AM |
|
|
Thread: --restore with the change of workload profile?
Post: RE: --restore with the change of workload profile?
To clarify: adding command-line options to a restore process generally doesn't work very well. You have to modify the restore file manually. I recommend making a backup copy of it first. The script th... |
|
royce |
hashcat
|
4 |
6,657 |
02-24-2017, 01:39 AM |
|
|
Thread: Use with Xeon Phi
Post: RE: Use with Xeon Phi
Search the forum for "Xeon phi" - you'll find a few hits, but focus on the ones 2016 and later (that's when support was added, IIRC). Also IIRC the performance is not stellar. |
|
royce |
hashcat
|
9 |
6,679 |
06-07-2018, 06:29 PM |
|
|
Thread: Use with Xeon Phi
Post: RE: Use with Xeon Phi
I don't think there's anything special required. If the OS, GPU drivers, and OpenCL are installed properly and supported, it should Just Work™. :) |
|
royce |
hashcat
|
9 |
6,679 |
06-08-2018, 04:25 AM |
|
|
Thread: Use with Xeon Phi
Post: RE: Use with Xeon Phi
That's not a Phi problem; that's an OS problem. What OS is it? |
|
royce |
hashcat
|
9 |
6,679 |
06-11-2018, 05:19 PM |
|
|
Thread: Keepass file Line-length exception.
Post: RE: Keepass file Line-length exception.
You cannot directly load the keepass file itself - you need to extract the hash to provide to hashcat.
John the Ripper's keepass2john or harmj0y's Python port of keepass2john (https://gist.github.c... |
|
royce |
hashcat
|
8 |
6,754 |
06-04-2017, 04:45 PM |
|
|
Thread: Keepass file Line-length exception.
Post: RE: Keepass file Line-length exception.
If you're just using CPU, maybe try -D 1 ?
More info here:
https://hashcat.net/forum/thread-5566.html |
|
royce |
hashcat
|
8 |
6,754 |
06-04-2017, 06:03 PM |
|
|
Thread: Keepass file Line-length exception.
Post: RE: Keepass file Line-length exception.
Could you be more specific? :) |
|
royce |
hashcat
|
8 |
6,754 |
06-04-2017, 06:59 PM |
|
|
Thread: Keepass file Line-length exception.
Post: RE: Keepass file Line-length exception.
To cross-check your methodology, consider creating a new KeePass volume with the same specifications and a known password, then try to crack that. :) |
|
royce |
hashcat
|
8 |
6,754 |
06-04-2017, 09:07 PM |
|
|
Thread: Generating wordlist using specific charlist with exclusions
Post: RE: Generating wordlist using specific charlist wi...
Be sure to also do the math to calculate how many password candidates these rules will eliminate compared the speed of your attack. Some of the rules you're describing won't reduce the keyspace very m... |
|
royce |
General Talk
|
8 |
6,771 |
02-17-2018, 07:31 PM |
|
|
Thread: Generating wordlist using specific charlist with exclusions
Post: RE: Generating wordlist using specific charlist wi...
I'm not aware of anything dedicated that would natively provide a way to express the rules you described in the original question.
At that point, you're basically looking at using python, perl, etc... |
|
royce |
General Talk
|
8 |
6,771 |
02-22-2018, 09:29 AM |