Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-19-2013, 12:32 PM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO... |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-24-2014, 10:08 PM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Thank you for the reminder; I need to look that up! |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-27-2014, 06:12 AM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
fuzztester Wrote: (10-18-2012, 08:25 PM)
--
I checked out using the maskprocess and piping it in. It does work but I must say, the performance was no where near as fast as a straight brute force mode... |
|
Incisive |
Very old oclHashcat-plus Support
|
15 |
45,253 |
10-18-2012, 10:15 PM |
|
|
Thread: Cracking MSSQL(2005) hashes
Post: RE: Cracking MSSQL(2005) hashes
On the SQL Servers you are authorized to audit:
SELECT sys.syslogins.name
, sys.server_principals.type
, LOGINPROPERTY(sys.syslogins.name,'PasswordHash') AS HashcatFormat
, UPPER(RIGHT(sys.fn_va... |
|
Incisive |
Very old oclHashcat-plus Support
|
2 |
12,195 |
12-16-2011, 11:27 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT.
For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u... |
|
Incisive |
General Talk
|
6 |
12,456 |
01-24-2014, 09:50 PM |
|
|
Thread: Hashcat 0.41 Combination mode not loading more than one dictionary?
Post: RE: Hashcat 0.41 Combination mode not loading more...
Thank you for informing me! |
|
Incisive |
Old hashcat Support
|
2 |
7,639 |
10-08-2012, 05:23 PM |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?
Finding blank passwords is indeed a feature, and a very important and welcome one!
Not finding any other hashes, however, is a bug :(. |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-27-2012, 05:05 PM |
|
|
Thread: hashcat-gui v0.5.0
Post: RE: hashcat-gui v0.5.0
Thank you very much for continuing to update the GUI! I've found it exceedingly helpful, both to actually run the hashcat programs easily, and to generate the command lines for later regression tests... |
|
Incisive |
Very old hashcat-GUI Announcements
|
5 |
36,814 |
01-16-2012, 05:34 PM |
|
|
Thread: How should I store my users passwords in my DB?
Post: RE: How should I store my users passwords in my DB...
1) Don't enforce a short maximum length - you're storing a hash, so if they want to use an epic passpoem, let them. The lower the number of scrypt or PBKDF2 iterations, the longer the minimum length ... |
|
Incisive |
General Help
|
4 |
10,284 |
07-19-2012, 08:57 PM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe... |
|
Incisive |
General Help
|
15 |
33,303 |
04-14-2013, 05:37 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Awesome job, philsmd!!!
Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:... |
|
Incisive |
General Help
|
15 |
33,303 |
04-15-2013, 06:12 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Mem5 Wrote: (04-19-2013, 07:51 AM)
--
Ok, I'll open a TRAC. Thank you for your help.
Curious question : how can somebody login into a system using a password with the null byte character ? As it i... |
|
Incisive |
General Help
|
15 |
33,303 |
04-19-2013, 12:02 PM |
|
|
Thread: mp64: generate total random words
Post: RE: mp64: generate total random words
A couple other random number generators that may be good sources for those that need them:
gpg --gen-random 2
openssl rand |
|
Incisive |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
20 |
42,453 |
05-21-2012, 06:09 PM |
|
|
Thread: oclHashcat-plus v0.06
Post: RE: oclHashcat-plus v0.06
Thank you very much for including the two MSSQL modes; those will be extremely useful for dictionary based password cracking of SQL Server passwords! |
|
Incisive |
Very old oclHashcat-plus Announcements
|
17 |
65,576 |
09-20-2011, 06:01 PM |
|
|
Thread: oclHashcat-plus v0.06 - add support for md5($pass.$salt)
Post: RE: oclHashcat-plus v0.06 - add support for md5($p...
Could this be alleviated instead by a documentation change?
for instance:
md5($pass.$salt): Joomla vX1 to vY1+, App2 vX2 to vY2+, App3 vX3 to vY3+. This is a single md5 hash of the password and s... |
|
Incisive |
Very old oclHashcat-plus Support
|
5 |
12,825 |
12-20-2011, 04:49 PM |
|
|
Thread: oclHashcat-plus v0.08
Post: RE: oclHashcat-plus v0.08
Thank you very much for the new release; in particular, the new EULA is very generous on your part, given how much time you put into hashcat. I'll be passing the information on the new EULA along to ... |
|
Incisive |
Very old oclHashcat-plus Announcements
|
15 |
58,070 |
05-04-2012, 05:51 AM |
|
|
Thread: oclHashcat-plus v0.13 and oclHashcat-lite v0.14
Post: RE: oclHashcat-plus v0.13 and oclHashcat-lite v0.1...
Dolphin Wrote: (02-02-2013, 01:19 PM)
--
I'm personally seeing a slight decrease in performance when upgrading to Catalyst 13.1 (up to 15% on some algorithms) but that's not really a reason to compla... |
|
Incisive |
Very old oclHashcat-plus Announcements
|
35 |
88,966 |
02-04-2013, 08:36 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
I'll run that test and post results.
ETA: Still trying to duplicate the error even with --output-format=7; the "stopped working" error I just posted appears to be more frequent than the output corrup... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,173 |
03-30-2013, 07:20 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
Yes, it's repeatable without any --output-format at all, though there are fewer short rows after the long rows.
Moreover, further testing indicates it happens just before the "has stopped working" Wi... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,173 |
03-31-2013, 05:21 AM |