Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
From the PM, it looks like you'd benefit from doing what philsmd described - using the 'skip' and 'limit' options to split the job across two nodes.
philsmd, I'm actually not aware of a simple tutori... |
|
royce |
hashcat
|
9 |
1,575 |
04-26-2020, 04:48 PM |
|
|
Thread: What makes cracking faster for a given algorithm
Post: RE: What makes cracking faster for a given algorit...
The answer should be intuitive.
Some algorithms are literally much 'faster' than others. If the hash wasn't really designed for cracking-resistant password storage - such as MD5 - then it's quite fas... |
|
royce |
General Talk
|
1 |
1,563 |
02-11-2019, 03:05 AM |
|
|
Thread: Hashcat self-destructs (Windows)
Post: RE: Hashcat self-destructs (Windows)
Ah, so it was previously running, and then it got overwritten somehow?
My first instinct is to say that it's almost certainly due to either a non-hashcat-supplied script with a bug in it, or some o... |
|
royce |
hashcat
|
2 |
1,558 |
04-06-2019, 05:09 PM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
Crunch is unnecessary for most attacks:
* Limiting duplicate characters is not worth the sacrifice in speed
* Resumption of candidate generation is built in natively to hashcat
Generating candi... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 05:19 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - c... |
|
royce |
General Talk
|
4 |
1,523 |
05-20-2020, 04:55 PM |
|
|
Thread: Need a new hardware to run Hashcat?
Post: RE: Need a new hardware to run Hashcat?
If your card is still supported by latest stable AMD drivers, it should be supported by hashcat. |
|
royce |
hashcat
|
4 |
1,509 |
12-19-2019, 09:27 AM |
|
|
Thread: Installing CL_OUT_OF_RESOURCES patch
Post: RE: Installing CL_OUT_OF_RESOURCES patch
The instructions on the wiki page are very clear - create a .reg file with the specified contents, then run it as Administrator and reboot. That last part is Google-able. |
|
royce |
hashcat
|
1 |
1,507 |
12-11-2018, 05:59 AM |
|
|
Thread: Graphic card or cloud computing
Post: RE: Graphic card or cloud computing
This depends on your use case.
If you have a one-time cracking job that will only take a few hours or days, then the cloud makes more sense.
If you intend to have longer-running jobs, or multipl... |
|
royce |
hashcat
|
3 |
1,505 |
10-11-2019, 07:34 AM |
|
|
Thread: Little sugdestion
Post: RE: Little sugdestion
https://hashcat.net/wiki/doku.php?id=mask_attack ?
Specifically, a list of multiple masks, generated with policygen from the PACK toolkit or similar. |
|
royce |
hashcat
|
1 |
1,493 |
09-02-2018, 09:50 PM |
|
|
Thread: Most Efficient KeePass Path of Mix Dictionary and characters
Post: RE: Most Efficient KeePass Path of Mix Dictionary ...
Not much to optimize here; you're the person best positioned to guess what your own password was. SLI is irrelevant (and even contraindicated; I'd remove it and let hashcat manage the GPUs directly). ... |
|
royce |
hashcat
|
1 |
1,488 |
11-10-2018, 07:45 AM |
|
|
Thread: Crack pbkdf2
Post: RE: Crack pbkdf2
Please see the forum rules. Posting hashes is not allowed. I have redacted your hash.
https://hashcat.net/forum/archive/index.php?announcement-2.html
There are a number of tutorials showing basi... |
|
royce |
hashcat
|
7 |
1,452 |
03-29-2020, 04:33 AM |
|
|
Thread: Hashing Linux Passwords
Post: RE: Hashing Linux Passwords
hashcat can't parse the entire /etc/shadow format with all fields.
hashcat expects either a list of raw hashes (or, when using --username, user:hash pairs)
Just trim off the first two fields (cu... |
|
royce |
hashcat
|
3 |
1,447 |
10-30-2019, 03:22 PM |
|
|
Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...
And if it needs to be more than two words wide, you can do something crude like this:
https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2 |
|
royce |
hashcat
|
3 |
1,428 |
09-04-2019, 02:41 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
WFM:
Code:
--
$ hashcat --version
v5.1.0-1789-gc7da6357
$ file rockyou.txt.gz
rockyou.txt.gz: gzip compressed data, was "rockyou.txt", last modified: Thu Jul 7 14:27:39 2016, from Unix
$ wc -l r... |
|
royce |
hashcat
|
6 |
1,379 |
05-23-2020, 07:31 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
I'm not sure, but I think that decompressed data can be used "on the fly" - as soon as it's decompressed, without having to wait for the entire file to decompress. |
|
royce |
hashcat
|
6 |
1,379 |
05-24-2020, 03:48 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Yes, that seems right. It would have to decompress the whole thing first, enough to analyze the statistics and then cache them. so I assume there would be some duplicated work, just like dictionary ca... |
|
royce |
hashcat
|
6 |
1,379 |
05-25-2020, 10:28 PM |
|
|
Thread: My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o
Post: RE: My amd gpu hashcat -b -m 17200 can't get the b...
Thanks for masking the hash!
Could you provide the full commandline you're using, and the output that you get (continuing to mask any hashes)? |
|
royce |
hashcat
|
2 |
1,345 |
10-21-2019, 04:18 AM |
|
|
Thread: 3DES Known Plaintext - How?
Post: RE: 3DES Known Plaintext - How?
Separate from your syntax issue ... have you done the math of how long it would take to exhaust this mask (if it were even possible to run it with hashcat)?
https://www.wolframalpha.com/input/?i=95... |
|
royce |
hashcat
|
3 |
1,293 |
02-10-2020, 03:30 AM |
|
|
Thread: Can i use mask but for hash?
Post: RE: Can i use mask but for hash?
There are tools for doing this for some specific hash types, but official hashcat does not currently support this. |
|
royce |
hashcat
|
3 |
1,287 |
01-07-2020, 08:26 AM |
|
|
Thread: Can i use mask but for hash?
Post: RE: Can i use mask but for hash?
I think there is a fork or two of hashcat out there that does this. Also there are specialized tools like epixoip's md5substr: https://github.com/epixoip/md5substr/blob/master/md5substr.c |
|
royce |
hashcat
|
3 |
1,287 |
01-07-2020, 08:35 PM |