Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Yet another "Which Card" newbie question
Post: RE: Yet another "Which Card" newbie question
FWIW, this is what I did, hardware-wise:
https://roycebits.blogspot.com/2015/08/no-sense-in-wasting-heat-and-air.html
And here are some performance benchmarks for descrypt (but they are useful for ... |
|
royce |
Hardware
|
4 |
6,798 |
11-25-2015, 09:20 AM |
|
|
Thread: Yet another "Which Card" newbie question
Post: RE: Yet another "Which Card" newbie question
Also note that upcoming 1.38 release of hashcat has *significantly* better descrypt and LM performance, if those are of interest to you. |
|
royce |
Hardware
|
4 |
6,798 |
11-25-2015, 09:22 AM |
|
|
Thread: Adding to .pot file
Post: RE: Adding to .pot file
There may be other ways, but quitting and restoring the hashcat session will reread the pot file. |
|
royce |
Old hashcat Support
|
4 |
6,832 |
11-29-2015, 08:02 PM |
|
|
Thread: Adding to .pot file
Post: RE: Adding to .pot file
Ah, I misunderstood. I thought you meant after a cracking run had started, but it sounds like you're talking about doing this before your initial cracking run begins. That's much easier! Yes, by al... |
|
royce |
Old hashcat Support
|
4 |
6,832 |
11-29-2015, 11:45 PM |
|
|
Thread: hashcat 4.0.1 more slow than 3.6 (GT 740M)
Post: RE: hashcat 4.0.1 more slow than 3.6 (GT 740M)
asirena Wrote: (11-22-2017, 02:38 PM)
--
atom, you should use the same parameter in both cases in order to compare the results...
If you use -w4 with one of them and -w3 with the other one, you a... |
|
royce |
hashcat
|
7 |
6,862 |
11-22-2017, 08:47 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
And if you need it before it's added to hashcat, you'll have to fall back to other tools. John the Ripper supports it with a dynamic mode (CPU only):
Code:
--
Format label ... |
|
royce |
hashcat
|
8 |
6,872 |
02-17-2018, 07:21 PM |
|
|
Thread: 1050Ti benchmark
Post: RE: 1050Ti benchmark
Thanks for the benchmark! Would be handy to have a 1050 Ti benchmark on the latest version (4.0.1) also, if you have time. |
|
royce |
Hardware
|
5 |
6,879 |
11-19-2017, 03:22 AM |
|
|
Thread: Cyrillic --> English transliterated passwords wordlist
Post: RE: Cyrillic --> English transliterated passwords ...
RealEnder, wlc was new to me - thanks for the tip, looks very useful. |
|
royce |
hashcat
|
7 |
6,887 |
12-01-2017, 05:45 PM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
There is indeed a max length for princeprocessor.
https://github.com/hashcat/princeprocessor/blob/master/src/pp.c#L32
You'll need to modify the source, increase PW_MAX to at least 20 (in your ca... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-23-2018, 04:27 PM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
YW. Make sure that PW_MAX is 4x the length of your longest word. Enjoy! |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-23-2018, 05:20 PM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
Assuming a dictionary whose longest word length is (for example) 12, and a four-word passphrase, then the maximum length of the entire passphrase is 12 x 4 = 48. |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-24-2018, 06:25 AM |
|
|
Thread: PrinceProcessor
Post: RE: PrinceProcessor
If we assume that the four words are Diceware-style, and truly chosen at random from a list, then for a four-word passphrase, princeprocessor would properly try "barnbarnbarnbarn', etc, but IIRC combi... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
7 |
6,901 |
05-23-2018, 05:16 PM |
|
|
Thread: Hashcat clCreateContext(): CL_INVALID_DEVICE error
Post: RE: Hashcat clCreateContext(): CL_INVALID_DEVICE e...
As you can see from the automatic string substitution that happens here in the forums, The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali)'s OpenCL handling is problematic. This problem is almos... |
|
royce |
hashcat
|
3 |
6,971 |
04-16-2017, 04:45 PM |
|
|
Thread: Hashcat clCreateContext(): CL_INVALID_DEVICE error
Post: RE: Hashcat clCreateContext(): CL_INVALID_DEVICE e...
Understood. As far as use of hashcat itself is concerned, you're not doing anything wrong.
And your driver looks current. If you're working from a clean setup as described here (https://hashcat.n... |
|
royce |
hashcat
|
3 |
6,971 |
04-17-2017, 07:11 AM |
|
|
Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat
I'd also run a benchmark (hashcat -b -m 0) to quickly determine if it's a setup problem vs an attack methodology problem. If your driver/etc are set up correctly, a benchmark should peg all available ... |
|
royce |
Hardware
|
9 |
6,982 |
05-18-2018, 04:45 AM |
|
|
Thread: Total newbie needing advice
Post: RE: Total newbie needing advice
Googling for "hashcat wpa", the first hit is:
https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
Does this help? |
|
royce |
Old oclHashcat Support
|
5 |
6,999 |
11-15-2015, 11:22 PM |
|
|
Thread: Total newbie needing advice
Post: RE: Total newbie needing advice
And in your case, if it's 8 lower case, the mask would be ?l?l?l?l?l?l?l?l, using attack mode 3 (-a 3), so something like:
[hashcat executable] -m 2500 -a 3 myfile.hccap ?l?l?l?l?l?l?l?l |
|
royce |
Old oclHashcat Support
|
5 |
6,999 |
11-15-2015, 11:24 PM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
It's after the official period of the challenge, but since people could theoretically keep working on it ...
If you post the syntax you were using, we might be able to help. The hashcat hash mode i... |
|
royce |
General Talk
|
9 |
7,198 |
05-12-2018, 07:22 PM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
Yep. The only way to make real progress on it would be if multiple teams with lots of cards all cooperated. Which would itself be pretty cool, IMO. |
|
royce |
General Talk
|
9 |
7,198 |
05-14-2018, 04:45 PM |
|
|
Thread: 1Password Competition
Post: RE: 1Password Competition
Proof of concept:
Code:
--
# Convert salt and hash from hex to raw and then to base64:
$ echo -n '00bb202b205f064e30f6fae101162a2e' | xxd -p -r | base64
ALsgKyBfBk4w9vrhARYqLg==
$ echo -n '919... |
|
royce |
General Talk
|
9 |
7,198 |
05-13-2018, 09:42 PM |