Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Yes, that seems right. It would have to decompress the whole thing first, enough to analyze the statistics and then cache them. so I assume there would be some duplicated work, just like dictionary ca... |
|
royce |
hashcat
|
6 |
1,379 |
05-25-2020, 10:28 PM |
|
|
Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...
And if it needs to be more than two words wide, you can do something crude like this:
https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2 |
|
royce |
hashcat
|
3 |
1,428 |
09-04-2019, 02:41 PM |
|
|
Thread: Hashing Linux Passwords
Post: RE: Hashing Linux Passwords
hashcat can't parse the entire /etc/shadow format with all fields.
hashcat expects either a list of raw hashes (or, when using --username, user:hash pairs)
Just trim off the first two fields (cu... |
|
royce |
hashcat
|
3 |
1,447 |
10-30-2019, 03:22 PM |
|
|
Thread: Crack pbkdf2
Post: RE: Crack pbkdf2
Please see the forum rules. Posting hashes is not allowed. I have redacted your hash.
https://hashcat.net/forum/archive/index.php?announcement-2.html
There are a number of tutorials showing basi... |
|
royce |
hashcat
|
7 |
1,452 |
03-29-2020, 04:33 AM |
|
|
Thread: Most Efficient KeePass Path of Mix Dictionary and characters
Post: RE: Most Efficient KeePass Path of Mix Dictionary ...
Not much to optimize here; you're the person best positioned to guess what your own password was. SLI is irrelevant (and even contraindicated; I'd remove it and let hashcat manage the GPUs directly). ... |
|
royce |
hashcat
|
1 |
1,488 |
11-10-2018, 07:45 AM |
|
|
Thread: Little sugdestion
Post: RE: Little sugdestion
https://hashcat.net/wiki/doku.php?id=mask_attack ?
Specifically, a list of multiple masks, generated with policygen from the PACK toolkit or similar. |
|
royce |
hashcat
|
1 |
1,493 |
09-02-2018, 09:50 PM |
|
|
Thread: Graphic card or cloud computing
Post: RE: Graphic card or cloud computing
This depends on your use case.
If you have a one-time cracking job that will only take a few hours or days, then the cloud makes more sense.
If you intend to have longer-running jobs, or multipl... |
|
royce |
hashcat
|
3 |
1,505 |
10-11-2019, 07:34 AM |
|
|
Thread: Installing CL_OUT_OF_RESOURCES patch
Post: RE: Installing CL_OUT_OF_RESOURCES patch
The instructions on the wiki page are very clear - create a .reg file with the specified contents, then run it as Administrator and reboot. That last part is Google-able. |
|
royce |
hashcat
|
1 |
1,507 |
12-11-2018, 05:59 AM |
|
|
Thread: Need a new hardware to run Hashcat?
Post: RE: Need a new hardware to run Hashcat?
If your card is still supported by latest stable AMD drivers, it should be supported by hashcat. |
|
royce |
hashcat
|
4 |
1,509 |
12-19-2019, 09:27 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
Crunch is unnecessary for most attacks:
* Limiting duplicate characters is not worth the sacrifice in speed
* Resumption of candidate generation is built in natively to hashcat
Generating candi... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 05:19 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - c... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 04:55 PM |
|
|
Thread: Hashcat self-destructs (Windows)
Post: RE: Hashcat self-destructs (Windows)
Ah, so it was previously running, and then it got overwritten somehow?
My first instinct is to say that it's almost certainly due to either a non-hashcat-supplied script with a bug in it, or some o... |
|
royce |
hashcat
|
2 |
1,558 |
04-06-2019, 05:09 PM |
|
|
Thread: What makes cracking faster for a given algorithm
Post: RE: What makes cracking faster for a given algorit...
The answer should be intuitive.
Some algorithms are literally much 'faster' than others. If the hash wasn't really designed for cracking-resistant password storage - such as MD5 - then it's quite fas... |
|
royce |
General Talk
|
1 |
1,563 |
02-11-2019, 03:05 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
By default, hashcat doesn't start from 'aaaaa' - instead, it starts with sets of characters that appear most frequently in common passwords, called Markov mode. For example, if you try '?d?d?d?d?d', i... |
|
royce |
hashcat
|
9 |
1,575 |
04-26-2020, 02:42 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
One use case I can think of is when you intend to bruteforce an entire keyspace, and want to "meet in the middle" by having one system work forwards, and the other system work backwards. This would wo... |
|
royce |
hashcat
|
9 |
1,575 |
04-26-2020, 03:33 PM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
Well, my point was that if you could just start a run from the other end, you wouldn't have to calculate keyspace at all (for the case of two attack systems) |
|
royce |
hashcat
|
9 |
1,575 |
04-26-2020, 04:02 PM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
From the PM, it looks like you'd benefit from doing what philsmd described - using the 'skip' and 'limit' options to split the job across two nodes.
philsmd, I'm actually not aware of a simple tutori... |
|
royce |
hashcat
|
9 |
1,575 |
04-26-2020, 04:48 PM |
|
|
Thread: [split] hashcat v4.1.0
Post: RE: hashcat v4.1.0
Rangletrap, please read the forum rules:
https://hashcat.net/forum/archive/index.php?announcement-2.html
* Do not post hashes
* Do not ask people to crack your hashes
* Do not hijack threads (... |
|
royce |
hashcat
|
1 |
1,577 |
05-17-2018, 06:07 PM |
|
|
Thread: Help with specific password scheme
Post: RE: Help with specific password scheme
A hybrid attack might be fine. If you generate the wordlist on the fly, no need to store it anywhere. I'd do it with everything but the first four digits prepended and then pipe the output of that scr... |
|
royce |
hashcat
|
3 |
1,589 |
04-01-2019, 04:48 PM |
|
|
Thread: Help with specific password scheme
Post: RE: Help with specific password scheme
The rules would probably have to stop there, because the number of combinations would probably go up pretty quickly - adding three specials to the previous calculation would be 600K rules x (35^3) wou... |
|
royce |
hashcat
|
3 |
1,589 |
04-02-2019, 04:06 AM |