Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Cisco IOS MD5 BruteForce Mask
Post: RE: Cisco IOS MD5 BruteForce Mask
This looks normal. Brute force automatically starts with short masks and then moves on to longer ones. While it's moving through the short masks, they're too short to really make the GPUs work hard, ... |
|
royce |
General Help
|
8 |
29,654 |
04-14-2015, 08:44 PM |
|
|
Thread: hashcat v3.6.0
Post: RE: hashcat v3.6.0
Benchmarks for 1080:
Code:
--
$ nvidia-smi | grep Driver
| NVIDIA-SMI 375.66 Driver Version: 375.66 |
$ uname -sm
Linux x86_64
$ cat /etc/lsb-release | grep DE... |
|
royce |
hashcat
|
6 |
26,344 |
06-09-2017, 06:14 PM |
|
|
Thread: hashcat v3.6.0
Post: RE: hashcat v3.6.0
magimix Wrote: (06-12-2017, 10:42 AM)
--
hello royce
can you tell me, what is your OS and what is your version of nvidia drivers please.
Thanks you !
--
Good call. Will also update post.
... |
|
royce |
hashcat
|
6 |
26,344 |
06-12-2017, 03:04 PM |
|
|
Thread: How Calculate GPU Cracking Time
Post: RE: How Calculate GPU Cracking Time
The best way to do this is to perform an actual run.
Raw wordlist mode (with no rules) is very, very fast. hashcat's guessing speed is so fast that it can often spend more time caching a large dict... |
|
royce |
hashcat
|
10 |
25,369 |
03-26-2017, 05:36 PM |
|
|
Thread: Bitslice status and broken nvcc
Post: RE: Bitslice status and broken nvcc
Can the source be reduced to a minimal test case, suitable for sharing with the nvcc team? |
|
royce |
General Talk
|
16 |
25,328 |
10-25-2015, 07:40 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Have you looked into hashcat's rules and masks? You may be able to significantly reduced the size of your wordlist, in exchange for faster coverage of your likely password space.
For example, if your... |
|
royce |
hashcat
|
26 |
24,601 |
03-19-2017, 06:54 AM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil... |
|
royce |
hashcat
|
17 |
24,505 |
08-31-2016, 11:22 PM |
|
|
Thread: blowfish brute
Post: RE: blowfish brute
An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt.
Can you post the full command line you're using? |
|
royce |
hashcat
|
17 |
24,505 |
09-01-2016, 01:23 AM |
|
|
Thread: correct command line
Post: RE: correct command line
Are you getting a specific error? Can you post the command line that you're trying? |
|
royce |
hashcat
|
24 |
22,563 |
10-05-2017, 05:00 PM |
|
|
Thread: correct command line
Post: RE: correct command line
One-character parameters (single hyphen) don't work with equals signs, but multi-character (two hyphens) should work with equals signs.
Code:
--
$ echo blah | hashcat --hash-type=1000 --stdout
... |
|
royce |
hashcat
|
24 |
22,563 |
12-25-2017, 08:47 PM |
|
|
Thread: OpenCl kernel self-test failed when using any version later than v4.2.1 !!
Post: RE: OpenCl kernel self-test failed when using any ...
I appreciate why this change happened, but from a UX perspective, especially for users who are not developers or very busy and not tracking hashcat release notes, is there any way to at least detect t... |
|
royce |
hashcat
|
29 |
21,222 |
02-06-2019, 05:44 PM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
Yeah, it sounds like you need a mode that I don't think hashcat currently supports:
md5(md5($salt).md5($pass))
You could then format your hashes as [hash]:[username], and use the username as the... |
|
royce |
hashcat
|
21 |
20,787 |
05-12-2017, 01:33 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
I haven't tried it, but MDXfind might support it? It lists "MD5-MD5SALTMD5PASS". MDXfind supports CPU. |
|
royce |
hashcat
|
21 |
20,787 |
05-12-2017, 02:04 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
|
royce |
hashcat
|
21 |
20,787 |
05-12-2017, 09:04 AM |
|
|
Thread: Build advice
Post: RE: Build advice
Yep, that looks about right. |
|
royce |
Hardware
|
27 |
20,575 |
12-18-2017, 01:42 AM |
|
|
Thread: PrinceProcessor now open source
Post: RE: PrinceProcessor now open source
I have changed ELEM_CNT_MAX, but have not tried changing OUT_LEN_MAX. |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
12 |
20,293 |
11-19-2017, 01:39 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
For more on the scope and impact of keyspace, see
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace
Also, atom: can you speak to what keyspace is actually intend... |
|
royce |
hashcat
|
15 |
20,287 |
11-24-2017, 02:55 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
*lightbulb*
Ahhhh ... so they only need to be "proportional" within specific attack type/combos, and that's why they can't be compared across them! Because it's *called* a keyspace ... but it isn't... |
|
royce |
hashcat
|
15 |
20,287 |
11-24-2017, 11:00 AM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
Yeah, the naming cat is probably already out of the bag.
I've clarified the FAQ section to make it very clear that hashcat --keyspace is specifically for distributing work, and does not directly co... |
|
royce |
hashcat
|
15 |
20,287 |
11-25-2017, 10:38 PM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
epixoip Wrote: (11-28-2017, 05:02 AM)
--
I can't really explain it any better than I already did in the thread you linked to. I guess I can try to expand upon it.
--
Great writeup. Totally stealing... |
|
royce |
hashcat
|
15 |
20,287 |
11-30-2017, 05:26 PM |