Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Cracking MSSQL(2005) hashes
Post: RE: Cracking MSSQL(2005) hashes
On the SQL Servers you are authorized to audit:
SELECT sys.syslogins.name
, sys.server_principals.type
, LOGINPROPERTY(sys.syslogins.name,'PasswordHash') AS HashcatFormat
, UPPER(RIGHT(sys.fn_va... |
|
Incisive |
Very old oclHashcat-plus Support
|
2 |
12,196 |
12-16-2011, 11:27 PM |
|
|
Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: PBKDF2/RFC2898/PKCS#5 modes?
As a less immediate, longer term project, I'd like to request generic PBKDF2 (also known as RFC2898 and PKCS#5) support, in whichever applications can reasonably support it. For hash algorithms, I'd ... |
|
Incisive |
Feature Requests
|
3 |
12,258 |
08-22-2012, 06:28 PM |
|
|
Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: RE: PBKDF2/RFC2898/PKCS#5 modes?
Aside from some applications following the OWASP Password Storage Cheat Sheet:
Django web framework
https://code.djangoproject.com/ticket/15367
https://www.levigross.com/post/18880148948/a-review-of... |
|
Incisive |
Feature Requests
|
3 |
12,258 |
08-27-2012, 10:45 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT.
For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u... |
|
Incisive |
General Talk
|
6 |
12,456 |
01-24-2014, 09:50 PM |
|
|
Thread: oclHashcat-plus v0.06 - add support for md5($pass.$salt)
Post: RE: oclHashcat-plus v0.06 - add support for md5($p...
Could this be alleviated instead by a documentation change?
for instance:
md5($pass.$salt): Joomla vX1 to vY1+, App2 vX2 to vY2+, App3 vX3 to vY3+. This is a single md5 hash of the password and s... |
|
Incisive |
Very old oclHashcat-plus Support
|
5 |
12,828 |
12-20-2011, 04:49 PM |
|
|
Thread: 7970 reaches 90 celsius
Post: RE: 7970 reaches 90 celsius
+1 on better cooling for both the card and the case - cold air in, over the heat sinks, hot air out. Arctic has a great reputation, and it's really not that difficult to swap out the cooler. Also, t... |
|
Incisive |
General Help
|
4 |
12,905 |
03-24-2013, 01:19 AM |
|
|
Thread: AES/Rijndael expert needed
Post: RE: AES/Rijndael expert needed
gat3way Wrote: (06-04-2012, 03:06 PM)
--
Much better idea would be to use a key derivation function like PBKDF2 with ïnitial symmetric key as salt with some good iterations count. Applying the pas... |
|
Incisive |
Feature Requests
|
5 |
14,079 |
06-07-2012, 07:10 AM |
|
|
Thread: amd catalyst 13.1
Post: RE: amd catalyst 13.1
What Windows error are you getting with 13.1? See my post about Permission denied followed by "stopped working" - are you getting the same error, or a different one?
What's your command line? What ... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
14,712 |
03-31-2013, 10:32 PM |
|
|
Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos
You can use
Code:
--
--outfile=Myfile.out --outfile-format=5
--
instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's... |
|
Incisive |
General Talk
|
8 |
14,736 |
05-03-2013, 04:26 PM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: 0.07(1?) MSSQL 2000/5 dictionary attack failure (e...
With a given file of sample hashes, and a small dictionary which should find at least one password without rules, and at least one password with a given rule, I'm getting 0 results in Straight mode, t... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
03-28-2012, 07:08 PM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...
atom Wrote: (03-29-2012, 10:03 AM)
--
you have to reformat the hashes, see my example above
--
Given that there are several SQL 2000 hashes, and two SQL 2005 hashes, and you can see the line length... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
03-29-2012, 04:17 PM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...
I just tested 0.08 with the hashcat 0.39 examples, and got fully correct results on a 6950; I'll test the 6450 out soon and report back. |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
05-04-2012, 05:41 AM |
|
|
Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...
I just pulled out 0.06, dropped it into the hashcat-gui-0.5.1 directory, and that doesn't work for me either.
Could it be the AMD 6450 512MB card, and/or Catalyst 12.2 (I reinstalled Catalyst with ... |
|
Incisive |
Very old oclHashcat-plus Support
|
7 |
15,717 |
03-28-2012, 09:50 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
I'll run that test and post results.
ETA: Still trying to duplicate the error even with --output-format=7; the "stopped working" error I just posted appears to be more frequent than the output corrup... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,175 |
03-30-2013, 07:20 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
https://hashcat.net/trac/ticket/111 (https://hashcat.net/trac/ticket/111) |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,175 |
03-31-2013, 09:10 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
Interesting - thank you for the additional information!
I have zero (0) evidence of driver restarts or anything like that, and during diagnosis, I used the ATI Catalyst graphics overclocking sectio... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,175 |
04-03-2013, 04:08 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: oclhashcat-Plus64.exe 0.14 bizzare output sections
Running some tests on the linkedin hash list, with oclhashcat-Plus4 in brute force mode (3), using --remove and --outfile-format=7, looking I see a lot of hashes cracked, in hash:plaintextPW:hexPW for... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,175 |
03-29-2013, 09:24 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
Yes, it's repeatable without any --output-format at all, though there are fewer short rows after the long rows.
Moreover, further testing indicates it happens just before the "has stopped working" Wi... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,175 |
03-31-2013, 05:21 AM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...
Honestly, I don't know what the "has stopped working" Windows error is, but it not accompanied by the more usual driver crashes where the entire screen freezes/blanks out for a bit, and then the a sma... |
|
Incisive |
Very old oclHashcat-plus Support
|
9 |
16,175 |
04-04-2013, 06:13 AM |
|
|
Thread: status from gpu cracking?
Post: RE: status from gpu cracking?
First, you may be confusing the "lite" version with the "plus" version.
lite is designed to operate on a single hash, fed in on the command line.
plus is designed to operate on a file of hashes.
He... |
|
Incisive |
Very old oclHashcat-plus Support
|
8 |
18,269 |
04-05-2013, 01:10 AM |