Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Host memory required for this attack: 64 MB
Post: RE: Host memory required for this attack: 64 MB
Did the attack work?
I think it's informative - not an error? |
|
royce |
hashcat
|
1 |
1,189 |
07-16-2019, 04:01 PM |
|
|
Thread: personal wrapper script that got out of hand, 'hashcrack'
Post: RE: personal wrapper script that got out of hand, ...
Interesting - thanks for the contribution! |
|
royce |
User Contributions
|
1 |
1,217 |
01-07-2020, 12:10 AM |
|
|
Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...
There's no single mask. You have to generate a *list of masks*.
You can do this with policygen from the PACK toolkit.
https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-... |
|
royce |
hashcat
|
2 |
1,220 |
08-18-2019, 06:24 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Please post your command line, with any sensitive info replaced with generic info |
|
royce |
hashcat
|
14 |
1,236 |
09-08-2020, 06:00 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
If you delete the empty potfile, is it recreated on the next run? |
|
royce |
hashcat
|
14 |
1,236 |
09-09-2020, 03:09 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
@philsmd, I can recreate this - for both TrueCrypt and Veracrypt, it seems, if a session is specified, but a potfile is not, then ses.potfile is not created on the fly that I can find (on Linux, anywa... |
|
royce |
hashcat
|
14 |
1,236 |
09-21-2020, 11:16 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Huh - when I did my veracrypt testing in late 2018, it used the filename. This seems like the approach that would cause the least amount of confusion. Otherwise, we'll have a steady stream of users as... |
|
royce |
hashcat
|
14 |
1,236 |
09-24-2020, 07:47 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
I've also opened an issue to explore improvements here:
https://github.com/hashcat/hashcat/issues/2554 |
|
royce |
hashcat
|
14 |
1,236 |
09-25-2020, 03:52 AM |
|
|
Thread: Password cracking guidance
Post: RE: Password cracking guidance
The magic word you're missing is "LUKS".
This should yield a few reasonable howtos:
https://www.google.com/search?q=LUKS+hashcat |
|
royce |
hashcat
|
1 |
1,238 |
08-06-2019, 05:05 AM |
|
|
Thread: Rule Question
Post: RE: Rule Question
Fair question.
If the rule file contains the "do nothing" rule directive ( : - just a colon by itself), then the original unmodified input words will be used. |
|
royce |
hashcat
|
3 |
1,245 |
08-26-2019, 03:50 PM |
|
|
Thread: Use whole RAM Colab
Post: RE: Use whole RAM Colab
Have you analyzed what resource is the bottleneck? Just a guess, but it's probably not RAM. |
|
royce |
hashcat
|
7 |
1,257 |
05-03-2020, 11:26 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
There's no online calculator that I'm aware of.
Just do the math:
1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450... |
|
royce |
hashcat
|
6 |
1,263 |
05-29-2020, 05:50 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
Because of the definition of ?a, as shown in hashcat --help:
Code:
--
- [ Built-in Charsets ] -
? | Charset
===+=========
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWX... |
|
royce |
hashcat
|
6 |
1,263 |
05-29-2020, 08:30 PM |
|
|
Thread: I have error please help me
Post: RE: I have error please help me
Yep, you can't do that.
It looks like you're trying to do a combinator attack. There's a direct combinator attack (which is -a 1), or there is a way to simulate a selectes subset of combinator effect... |
|
royce |
hashcat
|
3 |
1,264 |
12-15-2019, 11:10 PM |
|
|
Thread: Can i use mask but for hash?
Post: RE: Can i use mask but for hash?
There are tools for doing this for some specific hash types, but official hashcat does not currently support this. |
|
royce |
hashcat
|
3 |
1,287 |
01-07-2020, 08:26 AM |
|
|
Thread: Can i use mask but for hash?
Post: RE: Can i use mask but for hash?
I think there is a fork or two of hashcat out there that does this. Also there are specialized tools like epixoip's md5substr: https://github.com/epixoip/md5substr/blob/master/md5substr.c |
|
royce |
hashcat
|
3 |
1,287 |
01-07-2020, 08:35 PM |
|
|
Thread: 3DES Known Plaintext - How?
Post: RE: 3DES Known Plaintext - How?
Separate from your syntax issue ... have you done the math of how long it would take to exhaust this mask (if it were even possible to run it with hashcat)?
https://www.wolframalpha.com/input/?i=95... |
|
royce |
hashcat
|
3 |
1,293 |
02-10-2020, 03:30 AM |
|
|
Thread: My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o
Post: RE: My amd gpu hashcat -b -m 17200 can't get the b...
Thanks for masking the hash!
Could you provide the full commandline you're using, and the output that you get (continuing to mask any hashes)? |
|
royce |
hashcat
|
2 |
1,345 |
10-21-2019, 04:18 AM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
WFM:
Code:
--
$ hashcat --version
v5.1.0-1789-gc7da6357
$ file rockyou.txt.gz
rockyou.txt.gz: gzip compressed data, was "rockyou.txt", last modified: Thu Jul 7 14:27:39 2016, from Unix
$ wc -l r... |
|
royce |
hashcat
|
6 |
1,379 |
05-23-2020, 07:31 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
I'm not sure, but I think that decompressed data can be used "on the fly" - as soon as it's decompressed, without having to wait for the entire file to decompress. |
|
royce |
hashcat
|
6 |
1,379 |
05-24-2020, 03:48 PM |