Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?
Finding blank passwords is indeed a feature, and a very important and welcome one!
Not finding any other hashes, however, is a bug :(. |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-27-2012, 05:05 PM |
|
|
Thread: SIP (MD5)
Post: RE: SIP (MD5)
It looks like SIP has at least two places that use MD5 digest:
One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password).
The other place is duri... |
|
Incisive |
Feature Requests
|
5 |
31,778 |
08-31-2012, 09:13 PM |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: Hashcat 0.41 mode 1731 fails?
On hashcat 0.41 I'm not getting successful results (except with an apparent blank password) with -m 1731 on either your example hashes or even my own tests.
Intel Core i7-2600
Code:
--
hashca... |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-26-2012, 05:40 PM |
|
|
Thread: restarting dictionary with rules
Post: RE: restarting dictionary with rules
atom Wrote: (06-11-2012, 09:31 AM)
--
No, only oclHashcat-lite can do this. oclHashcat-plus is designed for short runs.
--
I don't know if it's possible, and I understand there are some technical i... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,429 |
06-11-2012, 09:56 PM |
|
|
Thread: How should I store my users passwords in my DB?
Post: RE: How should I store my users passwords in my DB...
1) Don't enforce a short maximum length - you're storing a hash, so if they want to use an epic passpoem, let them. The lower the number of scrypt or PBKDF2 iterations, the longer the minimum length ... |
|
Incisive |
General Help
|
4 |
10,284 |
07-19-2012, 08:57 PM |
|
|
Thread: 7970 reaches 90 celsius
Post: RE: 7970 reaches 90 celsius
+1 on better cooling for both the card and the case - cold air in, over the heat sinks, hot air out. Arctic has a great reputation, and it's really not that difficult to swap out the cooler. Also, t... |
|
Incisive |
General Help
|
4 |
12,902 |
03-24-2013, 01:19 AM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: oclhashcat-Plus64.exe 0.14 permission denied, "sto...
Running some tests on the linkedin hash list, with oclhashcat-Plus4 in brute force mode (3), using --remove and --outfile-format=7, at some points when many hashes are being cracked quickly, I'll see ... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-30-2013, 11:34 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...
This error appears to be highly correlated with https://hashcat.net/forum/thread-2182-post-13101.html, "oclhashcat-Plus64.exe 0.14 bizzare output sections". |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-31-2013, 05:23 AM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...
Got it, and I'll put it in the Trac as well.
https://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php (https://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php)
unmasked-100, a.k.a. unmask... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-31-2013, 08:54 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...
https://hashcat.net/trac/ticket/111 (https://hashcat.net/trac/ticket/111) |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-31-2013, 09:10 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-18-2013, 04:30 AM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-19-2013, 12:32 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...
I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes.
Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-17-2013, 05:10 AM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO... |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-24-2014, 10:08 PM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Thank you for the reminder; I need to look that up! |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-27-2014, 06:12 AM |
|
|
Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: PBKDF2/RFC2898/PKCS#5 modes?
As a less immediate, longer term project, I'd like to request generic PBKDF2 (also known as RFC2898 and PKCS#5) support, in whichever applications can reasonably support it. For hash algorithms, I'd ... |
|
Incisive |
Feature Requests
|
3 |
12,258 |
08-22-2012, 06:28 PM |
|
|
Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: RE: PBKDF2/RFC2898/PKCS#5 modes?
Aside from some applications following the OWASP Password Storage Cheat Sheet:
Django web framework
https://code.djangoproject.com/ticket/15367
https://www.levigross.com/post/18880148948/a-review-of... |
|
Incisive |
Feature Requests
|
3 |
12,258 |
08-27-2012, 10:45 PM |
|
|
Thread: problems with basic bruteforcing
Post: RE: problems with basic bruteforcing
A few other ways to generate hashes, for any users wanting to make sure their technique is giving the same results as other techniques:
Windows:
Code:
--
copy con password.txt
1234^z
md5sum pas... |
|
Incisive |
Old hashcat Support
|
3 |
6,459 |
04-03-2013, 04:14 PM |
|
|
Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...
If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes.
The archived thread on SQL Server 2012 hashes is at:
https://hashcat.net/foru... |
|
Incisive |
General Talk
|
3 |
9,888 |
04-04-2014, 04:12 PM |
|
|
Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...
It's still using the 0x200 identifier; I just double-checked. |
|
Incisive |
General Talk
|
3 |
9,888 |
04-07-2014, 04:23 AM |