Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Single 15 char NTLM Hash with known info
Post: RE: Single 15 char NTLM Hash with known info
You can use whatever rules make sense for your target. You may have to experiment with --stdout to determine whether the combination of --case-permute and your rules are doing what you're expecting. |
|
royce |
General Talk
|
4 |
3,365 |
01-01-2018, 10:02 PM |
|
|
Thread: Rejecting candidates under X characters while using rules set?
Post: RE: Rejecting candidates under X characters while ...
Yeah, I see the Layer-8 use case. You need to be able to assure people that you're not cracking passwords that are 15 chars or longer.
There's no way I know of within hashcat itself to guarantee that... |
|
royce |
hashcat
|
5 |
3,364 |
02-03-2019, 09:49 PM |
|
|
Thread: Rejecting candidates under X characters while using rules set?
Post: RE: Rejecting candidates under X characters while ...
Hmm, I wonder how hard it would be to modify hashcat to use -O to reject longer than 14 instead of 15. |
|
royce |
hashcat
|
5 |
3,364 |
02-03-2019, 10:01 PM |
|
|
Thread: bcrypt $2*$, Blowfish (Unix) slow speed
Post: RE: bcrypt $2*$, Blowfish (Unix) slow speed
What value is in the "cost" field of your hash? (the second $-separated field, two digits wide)?
Based on the speed you're getting, I'm guessing that it's probably cost 10? If so, that speed is norma... |
|
royce |
hashcat
|
4 |
3,358 |
09-11-2018, 10:35 PM |
|
|
Thread: bcrypt $2*$, Blowfish (Unix) slow speed
Post: RE: bcrypt $2*$, Blowfish (Unix) slow speed
(Unless you also post the plaintext, please don't post hashes.)
Your performance is quite normal for cost 10 on a 1080. |
|
royce |
hashcat
|
4 |
3,358 |
09-11-2018, 10:50 PM |
|
|
Thread: Tailor hashcat for cracking “german” passwords?
Post: RE: Tailor hashcat for cracking “german” passw...
Yes, UTF8 is probably fine for WPA2 entered via a web interface.
It sounds like you have the rest of the basics covered. Good luck! |
|
royce |
hashcat
|
2 |
3,338 |
03-25-2017, 09:26 PM |
|
|
Thread: Tailor hashcat for cracking “german” passwords?
Post: RE: Tailor hashcat for cracking “german” passw...
And for bruteforce beyond the basics, see this StackExchange answer (https://security.stackexchange.com/a/154958/6203). |
|
royce |
hashcat
|
2 |
3,338 |
03-26-2017, 06:52 PM |
|
|
Thread: Hashcat exiting with no error message
Post: RE: Hashcat exiting with no error message
|
royce |
hashcat
|
3 |
3,323 |
11-29-2018, 05:08 PM |
|
|
Thread: Passwords
Post: RE: Passwords
Being self-taught can be rewarding. With just a little bit of reading (hashcat FAQ, some examples/demos on YouTube), you can get the basics down pretty quickly. |
|
royce |
General Talk
|
1 |
3,322 |
11-19-2017, 03:03 AM |
|
|
Thread: special char in mask
Post: RE: special char in mask
On the (Windows?) command line, you'll need to handle differently any strings that contain an apostrophe (').
One of these may work:
1. Double quotes around the entire mask:
Code:
--
hashcat... |
|
royce |
hashcat
|
2 |
3,317 |
06-04-2017, 06:34 AM |
|
|
Thread: Brain working slow!!!
Post: RE: Brain working slow!!!
Yes, especially with fast hashes like MD5, a slow Internet connection definitely makes a difference. I speak from Alaskan experience. :)
You might switch to only using --brain-client-features=2, so... |
|
royce |
General Talk
|
4 |
3,284 |
11-10-2018, 11:48 PM |
|
|
Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters
This Stackexchange thread may be informative - it has some examples:
https://security.stackexchange.com/questions/154901/attack-wpa-password-with-hashcat-settings-and-resources-for-german-passwords/1... |
|
royce |
hashcat
|
4 |
3,252 |
01-29-2019, 03:09 AM |
|
|
Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters
It's often better to encode the custom charsets in the mask file itself, because it's persistent documentation of the nature of the attack that lives beyond that particular commandline. |
|
royce |
hashcat
|
4 |
3,252 |
01-30-2019, 05:12 PM |
|
|
Thread: Low Hashrate
Post: RE: Low Hashrate
Drop one or two ?b and try again |
|
royce |
hashcat
|
10 |
3,248 |
11-10-2019, 05:33 PM |
|
|
Thread: Pause/ resume with different dictionary
Post: RE: Pause/ resume with different dictionary
I don't know that there's a lot of value in changing the dictionary midstream. If you are 10M lines into your current dictionary when the restore file is updated, and then you quit, change the diction... |
|
royce |
hashcat
|
2 |
3,245 |
03-29-2017, 02:15 PM |
|
|
Thread: Hashcat not working
Post: RE: Hashcat not working
Are you still getting this error? It's very odd for "Device #1" to appear twice with the same number; could that be a typo? |
|
royce |
hashcat
|
1 |
3,242 |
11-19-2017, 02:42 AM |
|
|
Thread: How I can make a more efficient bruteforce attack?
Post: RE: How I can make a more efficient bruteforce att...
Take a look at
https://hashcat.net/wiki/doku.php?id=rule_based_attack
The 'd' rule function repeats a word. |
|
royce |
General Talk
|
1 |
3,240 |
08-02-2016, 03:02 PM |
|
|
Thread: truecrypt with unknown algorithm
Post: RE: truecrypt with unknown algorithm
There isn't an option to try all methods, because -- by design -- it is difficult to confirm which algorithms were used (other than by successfully mounting it or cracking it).
The best you'll be a... |
|
royce |
hashcat
|
2 |
3,237 |
06-06-2017, 02:43 PM |
|
|
Thread: Restoring session skips words
Post: RE: Restoring session skips words
Pretty sure that hashcat isn't skipping any of the keyspace. But I'm not sure why there's a difference in the output percentage. |
|
royce |
General Talk
|
2 |
3,227 |
11-19-2017, 02:55 AM |
|
|
Thread: Intel Nuc Opencl and Gpu issue
Post: RE: Intel Nuc Opencl and Gpu issue
This is a problem with Intel's OpenCL runtime. The hashcat project cannot fix it. |
|
royce |
hashcat
|
1 |
3,210 |
12-20-2017, 04:55 PM |