Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: What does the values in Speed Dev indicate
Post: RE: What does the values in Speed Dev indicate
The first device is hashing candidate passwords at a rate of roughly 9452700 hashes per second. |
|
royce |
hashcat
|
1 |
1,827 |
02-17-2018, 06:28 PM |
|
|
Thread: mask attack issue
Post: RE: mask attack issue
Have you tried --status and --status-timer ? |
|
royce |
hashcat
|
1 |
1,773 |
02-05-2018, 07:06 AM |
|
|
Thread: Hashrate
Post: RE: Hashrate
https://hashcat.net/faq/morework |
|
royce |
hashcat
|
2 |
1,759 |
02-04-2019, 07:39 AM |
|
|
Thread: hashcat do not work android linux ?
Post: RE: hashcat do not work android linux ?
There appears to be no OpenCL on this platform. OpenCL is required. |
|
royce |
hashcat
|
2 |
1,739 |
03-31-2019, 05:10 PM |
|
|
Thread: dapp / digital currency for password cracking
Post: RE: dapp / digital currency for password cracking
https://security.stackexchange.com/questions/62800/is-it-possible-to-use-bitcoin-miners-to-decrypt-files-communication |
|
royce |
General Talk
|
4 |
1,730 |
01-10-2020, 07:49 AM |
|
|
Thread: deshashing same hashes in different Sittes.
Post: RE: deshashing same hashes in different Sittes.
As long as the following are the same:
* the input files (if any)
* the hashes
* the hashcat.restore file (or [session-name].restore file)
* the version of hashcat (this may vary, but sometimes ... |
|
royce |
hashcat
|
1 |
1,695 |
09-05-2018, 03:20 PM |
|
|
Thread: How to disable the output of hacked hashes
Post: RE: How to disable the output of hacked hashes
The --outfile/--outfile-format parameters can suppress the console output this way. (If you don't want the output retains anywhere at all, you can map --outfile to /dev/null). |
|
royce |
hashcat
|
1 |
1,684 |
10-21-2018, 05:30 PM |
|
|
Thread: Pause Certain Devices
Post: RE: Pause Certain Devices
There's no interactive native way to do this today.
You could work around this by scripting something that does the following:
1. Stop the job.
2. Modify the restore file using https://github.c... |
|
royce |
hashcat
|
1 |
1,673 |
03-31-2018, 03:45 AM |
|
|
Thread: Error with NetNtlmv2 hash converted from john
Post: RE: Error with NetNtlmv2 hash converted from john
Hmm - NetNTLMv2 looks longer than that. See the example NetNTLMv2 hash here:
https://hashcat.net/wiki/doku.php?id=example_hashes
If your command line works with that example hash, the problem is... |
|
royce |
hashcat
|
1 |
1,667 |
07-05-2018, 05:27 PM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Do you mean that the plaintext is 32 characters?
If so, then unless you have a strong idea of its composition, bruteforce cannot reach even half of that keyspace. |
|
royce |
hashcat
|
4 |
1,655 |
10-21-2019, 06:20 AM |
|
|
Thread: Two Dictionaries + 3 digits
Post: RE: Two Dictionaries + 3 digits
Use 'combinator' tool from hashcat-utils and pipe it into hashcat, and then apply the ?d?d?d at the end using hashcat itself.
https://hashcat.net/wiki/doku.php?id=hashcat_utils#combinator
A simp... |
|
royce |
hashcat
|
1 |
1,640 |
08-13-2018, 07:02 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
Could you elaborate with a hypothetical/contrived example?
It sounds like you *might* be looking for masks. For example, if you know that a password is 10 characters and the first four characters a... |
|
royce |
hashcat
|
11 |
1,633 |
06-14-2020, 10:36 PM |
|
|
Thread: Veracrypt with keyfile
Post: RE: Veracrypt with keyfile
Sounds like it's a passphrase, and you know the wordlist, but not the order.
princeprocessor could be used to generate all possible combinations of words. You may need to alter princeprocessor's so... |
|
royce |
hashcat
|
2 |
1,630 |
02-25-2019, 07:20 PM |
|
|
Thread: Help me install hxctools
Post: RE: Help me install hxctools
Well, you could ask in this thread:
https://hashcat.net/forum/thread-6661.html |
|
royce |
hashcat
|
3 |
1,607 |
08-26-2019, 03:37 PM |
|
|
Thread: Help with specific password scheme
Post: RE: Help with specific password scheme
A hybrid attack might be fine. If you generate the wordlist on the fly, no need to store it anywhere. I'd do it with everything but the first four digits prepended and then pipe the output of that scr... |
|
royce |
hashcat
|
3 |
1,591 |
04-01-2019, 04:48 PM |
|
|
Thread: Help with specific password scheme
Post: RE: Help with specific password scheme
The rules would probably have to stop there, because the number of combinations would probably go up pretty quickly - adding three specials to the previous calculation would be 600K rules x (35^3) wou... |
|
royce |
hashcat
|
3 |
1,591 |
04-02-2019, 04:06 AM |
|
|
Thread: [split] hashcat v4.1.0
Post: RE: hashcat v4.1.0
Rangletrap, please read the forum rules:
https://hashcat.net/forum/archive/index.php?announcement-2.html
* Do not post hashes
* Do not ask people to crack your hashes
* Do not hijack threads (... |
|
royce |
hashcat
|
1 |
1,577 |
05-17-2018, 06:07 PM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
By default, hashcat doesn't start from 'aaaaa' - instead, it starts with sets of characters that appear most frequently in common passwords, called Markov mode. For example, if you try '?d?d?d?d?d', i... |
|
royce |
hashcat
|
9 |
1,576 |
04-26-2020, 02:42 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
One use case I can think of is when you intend to bruteforce an entire keyspace, and want to "meet in the middle" by having one system work forwards, and the other system work backwards. This would wo... |
|
royce |
hashcat
|
9 |
1,576 |
04-26-2020, 03:33 PM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
Well, my point was that if you could just start a run from the other end, you wouldn't have to calculate keyspace at all (for the case of two attack systems) |
|
royce |
hashcat
|
9 |
1,576 |
04-26-2020, 04:02 PM |