Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-19-2013, 12:32 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...
I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes.
Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-17-2013, 05:10 AM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO... |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-24-2014, 10:08 PM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Thank you for the reminder; I need to look that up! |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-27-2014, 06:12 AM |
|
|
Thread: oclHashcat-plus v0.06 - add support for md5($pass.$salt)
Post: RE: oclHashcat-plus v0.06 - add support for md5($p...
Could this be alleviated instead by a documentation change?
for instance:
md5($pass.$salt): Joomla vX1 to vY1+, App2 vX2 to vY2+, App3 vX3 to vY3+. This is a single md5 hash of the password and s... |
|
Incisive |
Very old oclHashcat-plus Support
|
5 |
12,828 |
12-20-2011, 04:49 PM |
|
|
Thread: hashcat-gui v0.5.0
Post: RE: hashcat-gui v0.5.0
Thank you very much for continuing to update the GUI! I've found it exceedingly helpful, both to actually run the hashcat programs easily, and to generate the command lines for later regression tests... |
|
Incisive |
Very old hashcat-GUI Announcements
|
5 |
36,817 |
01-16-2012, 05:34 PM |
|
|
Thread: AES/Rijndael expert needed
Post: RE: AES/Rijndael expert needed
gat3way Wrote: (06-04-2012, 03:06 PM)
--
Much better idea would be to use a key derivation function like PBKDF2 with ïnitial symmetric key as salt with some good iterations count. Applying the pas... |
|
Incisive |
Feature Requests
|
5 |
14,079 |
06-07-2012, 07:10 AM |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?
Finding blank passwords is indeed a feature, and a very important and welcome one!
Not finding any other hashes, however, is a bug :(. |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-27-2012, 05:05 PM |
|
|
Thread: SIP (MD5)
Post: RE: SIP (MD5)
It looks like SIP has at least two places that use MD5 digest:
One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password).
The other place is duri... |
|
Incisive |
Feature Requests
|
5 |
31,780 |
08-31-2012, 09:13 PM |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: Hashcat 0.41 mode 1731 fails?
On hashcat 0.41 I'm not getting successful results (except with an apparent blank password) with -m 1731 on either your example hashes or even my own tests.
Intel Core i7-2600
Code:
--
hashca... |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-26-2012, 05:40 PM |
|
|
Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...
To be fair, PBKDF2(HMAC-SHA1, pw, salt, 1000, 256) is absolutely much better than the previous SHA1(pw, salt). Completely insufficent and quite silly, but still better than we had. PBKDF2(HMAC-SHA-3... |
|
Incisive |
Feature Requests
|
6 |
30,198 |
12-12-2012, 09:30 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT.
For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u... |
|
Incisive |
General Talk
|
6 |
12,456 |
01-24-2014, 09:50 PM |
|
|
Thread: oclHashcat-plus: resume after shutdown
Post: RE: oclHashcat-plus: resume after shutdown
Would the resume be easier if it were a "close enough" resume?
Personally, I wouldn't be at all bothered by the resume re-cracking several minutes or even a couple of hours worth of work that it ha... |
|
Incisive |
Feature Requests
|
7 |
24,181 |
11-03-2011, 04:26 PM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: 0.07(1?) MSSQL 2000/5 dictionary attack failure (e...
With a given file of sample hashes, and a small dictionary which should find at least one password without rules, and at least one password with a given rule, I'm getting 0 results in Straight mode, t... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
03-28-2012, 07:08 PM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...
atom Wrote: (03-29-2012, 10:03 AM)
--
you have to reformat the hashes, see my example above
--
Given that there are several SQL 2000 hashes, and two SQL 2005 hashes, and you can see the line length... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
03-29-2012, 04:17 PM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...
I just tested 0.08 with the hashcat 0.39 examples, and got fully correct results on a 6950; I'll test the 6450 out soon and report back. |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
05-04-2012, 05:41 AM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...
I just pulled out 0.06, dropped it into the hashcat-gui-0.5.1 directory, and that doesn't work for me either.
Could it be the AMD 6450 512MB card, and/or Catalyst 12.2 (I reinstalled Catalyst with ... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
03-28-2012, 09:50 PM |
|
|
Thread: amd catalyst 13.1
Post: RE: amd catalyst 13.1
What Windows error are you getting with 13.1? See my post about Permission denied followed by "stopped working" - are you getting the same error, or a different one?
What's your command line? What ... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
14,712 |
03-31-2013, 10:32 PM |
|
|
Thread: status from gpu cracking?
Post: RE: status from gpu cracking?
First, you may be confusing the "lite" version with the "plus" version.
lite is designed to operate on a single hash, fed in on the command line.
plus is designed to operate on a file of hashes.
He... |
|
Incisive |
Very old oclHashcat-plus Support
|
8 |
18,269 |
04-05-2013, 01:10 AM |
|
|
Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos
You can use
Code:
--
--outfile=Myfile.out --outfile-format=5
--
instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's... |
|
Incisive |
General Talk
|
8 |
14,736 |
05-03-2013, 04:26 PM |