Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Problem get password that is in dictionary
Post: RE: Problem get password that is in dictionary
Try testing with the example hashcat hash:
https://hashcat.net/wiki/doku.php?id=example_hashes
This is "hashcat": $2a$05$LhayLxezLhK1LhWvKxCyLOj0j1u.Kj0jZ0pEmm134uzrQlFvQJLF6
If this works, it's mo... |
|
royce |
hashcat
|
12 |
12,532 |
02-28-2017, 04:49 PM |
|
|
Thread: Problem get password that is in dictionary
Post: RE: Problem get password that is in dictionary
Yes. Try it to see if it works. You are empowered to to definitively answer your own question. :) |
|
royce |
hashcat
|
12 |
12,532 |
03-02-2017, 05:00 PM |
|
|
Thread: office excel 2010 hash
Post: RE: office excel 2010 hash
What command lines have you tried, and what errors were geenrtaed? |
|
royce |
General Help
|
8 |
12,521 |
04-14-2015, 08:54 PM |
|
|
Thread: NTLM: hashcat vs RainbowCrack
Post: RE: NTLM: hashcat vs RainbowCrack
It depends. This boils down to the time/memory tradeoff. I'll lay out some of the concepts.
Most real-world passwords are of sufficiently low quality that if they are stored poorly (unsalted/fast h... |
|
royce |
hashcat
|
3 |
12,488 |
01-20-2017, 04:35 AM |
|
|
Thread: NTLM: hashcat vs RainbowCrack
Post: RE: NTLM: hashcat vs RainbowCrack
OK, that makes sense. So as soon as you have more than two or three hashes, hashcat will be faster even for limited bruteforce criteria that I listed. |
|
royce |
hashcat
|
3 |
12,488 |
01-20-2017, 05:17 AM |
|
|
Thread: Full hashcat benchmark of AMD Vega 64 on ROCm
Post: RE: Full hashcat benchmark of AMD Vega 64 on ROCm
Cool, thanks for the benchmarks. |
|
royce |
User Contributions
|
1 |
12,268 |
11-19-2017, 03:25 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Do a little more research into how to make images that compress well. It's quite feasible to make images that are very small. This avatar is only 3K:
https://gravatar.com/avatar/f720786ef4b2ff5b4b... |
|
royce |
hashcat
|
18 |
12,095 |
04-14-2018, 04:15 PM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
I don't know of a way to do this with hashcat today.
But the "jumbo" edition of John the Ripper has a "hidden" option (--keep-guessing) that will do this.
For CRC32, the source file has to be asse... |
|
royce |
hashcat
|
9 |
12,021 |
09-11-2016, 06:43 AM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
When using masks, hashcat uses the same sequence of passwords every time.
I haven't read your script thoroughly, but how does the script teach hashcat that it shouldn't just stop at the first one it ... |
|
royce |
hashcat
|
9 |
12,021 |
09-11-2016, 03:55 PM |
|
|
Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash
Ah, you're using the offset - nice! |
|
royce |
hashcat
|
9 |
12,021 |
09-11-2016, 04:39 PM |
|
|
Thread: Avoid character occurrance in brute force attack
Post: RE: Avoid character occurrance in brute force atta...
I don't think that there is a way to express this using hashcat's rules (unless you generated a very large list of masks and custom character sets).
And even if there were, I don't think that it wo... |
|
royce |
hashcat
|
12 |
12,013 |
03-06-2017, 01:49 AM |
|
|
Thread: Crack a long list efficiently
Post: RE: Crack a long list efficiently
Of course hashcat does this - even if there are different salts. Anything else would be bizarre. |
|
royce |
hashcat
|
10 |
11,851 |
08-13-2016, 04:29 PM |
|
|
Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!
That format has more fields, separated by asterisks, than your hash.
If you try your attack against this example hash from hashcat wiki has more fields:
$itunes_backup$*10*8b715f516ff8e64442c478... |
|
royce |
hashcat
|
3 |
11,610 |
04-13-2018, 04:48 PM |
|
|
Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!
Does your attack work against the example hash? If so, the problem is probably your hash. Double-check to ensure that the field count is identical. |
|
royce |
hashcat
|
3 |
11,610 |
04-14-2018, 05:13 AM |
|
|
Thread: Show which dictionary cracked the hash.
Post: RE: Show which dictionary cracked the hash.
Looking through the dictionaries won't tell you which rule was used.
For future work, or if you want to run your job again, check out --debug-mode. Mode 4 may be what you're looking for. This won't... |
|
royce |
hashcat
|
10 |
11,481 |
10-17-2016, 03:37 PM |
|
|
Thread: Hex-Charset cracked, but now what
Post: RE: Hex-Charset cracked, but now what
This may help: https://hashcat.net/forum/thread-3522.html
There is also a hashcat option to show cracks (--show). |
|
royce |
hashcat
|
8 |
11,465 |
09-12-2016, 05:20 PM |
|
|
Thread: What I'm doing wrong?
Post: RE: What I'm doing wrong?
Please post your command syntax for a sanity check. |
|
royce |
General Help
|
8 |
11,372 |
11-12-2015, 03:51 AM |
|
|
Thread: Unknown Hashes
Post: RE: Unknown Hashes
https://hashcat.net/forum/archive/index.php?announcement-2.html |
|
royce |
General Talk
|
2 |
11,344 |
09-22-2019, 07:34 AM |
|
|
Thread: Using for Axcrypt
Post: RE: Using for Axcrypt
You need to extract the Axcrypt hash, rather than feeding hashcat the entire file.
https://github.com/Fist0urs/AxSuite |
|
royce |
hashcat
|
10 |
11,233 |
05-30-2017, 08:59 PM |
|
|
Thread: Word Mangling/Wordlist generator
Post: RE: Word Mangling/Wordlist generator
Yeah, what undeath said - if we're talking about typos, or misspellings that are just a single character substitution, some rules are pretty good at transposing letters. Specifically, a ruleset like t... |
|
royce |
hashcat
|
5 |
11,200 |
01-13-2018, 06:29 PM |