Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: I have error please help me
Post: RE: I have error please help me
Yep, you can't do that.
It looks like you're trying to do a combinator attack. There's a direct combinator attack (which is -a 1), or there is a way to simulate a selectes subset of combinator effect... |
|
royce |
hashcat
|
3 |
1,264 |
12-15-2019, 11:10 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
There's no online calculator that I'm aware of.
Just do the math:
1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450... |
|
royce |
hashcat
|
6 |
1,263 |
05-29-2020, 05:50 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
Because of the definition of ?a, as shown in hashcat --help:
Code:
--
- [ Built-in Charsets ] -
? | Charset
===+=========
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWX... |
|
royce |
hashcat
|
6 |
1,263 |
05-29-2020, 08:30 PM |
|
|
Thread: Use whole RAM Colab
Post: RE: Use whole RAM Colab
Have you analyzed what resource is the bottleneck? Just a guess, but it's probably not RAM. |
|
royce |
hashcat
|
7 |
1,257 |
05-03-2020, 11:26 PM |
|
|
Thread: Rule Question
Post: RE: Rule Question
Fair question.
If the rule file contains the "do nothing" rule directive ( : - just a colon by itself), then the original unmodified input words will be used. |
|
royce |
hashcat
|
3 |
1,245 |
08-26-2019, 03:50 PM |
|
|
Thread: Password cracking guidance
Post: RE: Password cracking guidance
The magic word you're missing is "LUKS".
This should yield a few reasonable howtos:
https://www.google.com/search?q=LUKS+hashcat |
|
royce |
hashcat
|
1 |
1,238 |
08-06-2019, 05:05 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Please post your command line, with any sensitive info replaced with generic info |
|
royce |
hashcat
|
14 |
1,236 |
09-08-2020, 06:00 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
If you delete the empty potfile, is it recreated on the next run? |
|
royce |
hashcat
|
14 |
1,236 |
09-09-2020, 03:09 AM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
@philsmd, I can recreate this - for both TrueCrypt and Veracrypt, it seems, if a session is specified, but a potfile is not, then ses.potfile is not created on the fly that I can find (on Linux, anywa... |
|
royce |
hashcat
|
14 |
1,236 |
09-21-2020, 11:16 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
Huh - when I did my veracrypt testing in late 2018, it used the filename. This seems like the approach that would cause the least amount of confusion. Otherwise, we'll have a steady stream of users as... |
|
royce |
hashcat
|
14 |
1,236 |
09-24-2020, 07:47 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
I've also opened an issue to explore improvements here:
https://github.com/hashcat/hashcat/issues/2554 |
|
royce |
hashcat
|
14 |
1,236 |
09-25-2020, 03:52 AM |
|
|
Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...
There's no single mask. You have to generate a *list of masks*.
You can do this with policygen from the PACK toolkit.
https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-... |
|
royce |
hashcat
|
2 |
1,220 |
08-18-2019, 06:24 PM |
|
|
Thread: personal wrapper script that got out of hand, 'hashcrack'
Post: RE: personal wrapper script that got out of hand, ...
Interesting - thanks for the contribution! |
|
royce |
User Contributions
|
1 |
1,217 |
01-07-2020, 12:10 AM |
|
|
Thread: Host memory required for this attack: 64 MB
Post: RE: Host memory required for this attack: 64 MB
Did the attack work?
I think it's informative - not an error? |
|
royce |
hashcat
|
1 |
1,189 |
07-16-2019, 04:01 PM |
|
|
Thread: scrypt hash format
Post: RE: scrypt hash format
Example method - script by atom.
Code:
--
#!/usr/bin/perl
use strict;
use warnings;
use MIME::Base64;
while (my $line = )
{
chomp $line;
my @data = split '\$', $line;
if ($data[5] ne 64)
... |
|
royce |
hashcat
|
2 |
1,187 |
08-14-2019, 04:15 PM |
|
|
Thread: change working directory
Post: RE: change working directory
In the future, you can also use https://github.com/philsmd/analyze_hc_restore, written by a core hashcat developer. You can rewrite a restore file, changing various config items. |
|
royce |
hashcat
|
3 |
1,133 |
12-16-2019, 11:43 PM |
|
|
Thread: Juniper netscreen hash help
Post: RE: Juniper netscreen hash help
does the attack work against the Netscreen example hash from the hashcat wiki (https://hashcat.net/wiki/doku.php?id=example_hashes)?
nNxKL2rOEkbBc9BFLsVGG6OtOUO/8n:user |
|
royce |
hashcat
|
2 |
1,124 |
12-11-2019, 06:15 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit:
https://github.com/iphelix/pack/... |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 04:04 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
Yep. That's what will take 49 years. :) |
|
royce |
hashcat
|
4 |
1,108 |
05-20-2020, 10:35 AM |
|
|
Thread: SHA256 (AuthMe)
Post: RE: SHA256 (AuthMe)
This type is present in the beta version, not yet released.
https://hashcat.net/beta/
Or you can wait until the release. |
|
royce |
hashcat
|
2 |
1,085 |
01-25-2020, 07:35 PM |