Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO... |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-24-2014, 10:08 PM |
|
|
Thread: Best long brute-force masks
Post: RE: Best long brute-force masks
Thank you for the reminder; I need to look that up! |
|
Incisive |
Old oclHashcat Support
|
4 |
18,277 |
01-27-2014, 06:12 AM |
|
|
Thread: oclHashcat-plus: resume after shutdown
Post: RE: oclHashcat-plus: resume after shutdown
Would the resume be easier if it were a "close enough" resume?
Personally, I wouldn't be at all bothered by the resume re-cracking several minutes or even a couple of hours worth of work that it ha... |
|
Incisive |
Feature Requests
|
7 |
24,181 |
11-03-2011, 04:26 PM |
|
|
Thread: 1Password - AgileBits
Post: RE: 1Password - AgileBits
I'd also very, very much like to see *Hashcat* support PBKDF2(HMAC-xxx, passphrase, salt, iterations, outputLengthInBits) for at least SHA-1, and preferably the entire SHA-1, SHA-2, and SHA-3 families... |
|
Incisive |
Very old oclHashcat-plus Support
|
13 |
24,894 |
04-01-2013, 04:31 PM |
|
|
Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)
First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI!
I'd like to suggest that once you're happy with the ... |
|
Incisive |
General Talk
|
10 |
25,576 |
10-10-2013, 05:28 AM |
|
|
Thread: Operating Systems used by hashcat users
Post: RE: Operating Systems used by hashcat users
forumhero Wrote: (06-08-2012, 02:30 AM)
--
i use both windows and linux
--
+1 - I use Windows (7 Home Premium, 7 Pro)/ATI, Linux (Debian Squeeze, Backtrack 5R2)/ATI, Windows/NVIDIA, and Linux/NVIDI... |
|
Incisive |
Organisation and Events
|
10 |
28,242 |
06-08-2012, 04:37 AM |
|
|
Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...
To be fair, PBKDF2(HMAC-SHA1, pw, salt, 1000, 256) is absolutely much better than the previous SHA1(pw, salt). Completely insufficent and quite silly, but still better than we had. PBKDF2(HMAC-SHA-3... |
|
Incisive |
Feature Requests
|
6 |
30,198 |
12-12-2012, 09:30 PM |
|
|
Thread: SIP (MD5)
Post: RE: SIP (MD5)
It looks like SIP has at least two places that use MD5 digest:
One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password).
The other place is duri... |
|
Incisive |
Feature Requests
|
5 |
31,780 |
08-31-2012, 09:13 PM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe... |
|
Incisive |
General Help
|
15 |
33,313 |
04-14-2013, 05:37 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Awesome job, philsmd!!!
Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:... |
|
Incisive |
General Help
|
15 |
33,313 |
04-15-2013, 06:12 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Mem5 Wrote: (04-19-2013, 07:51 AM)
--
Ok, I'll open a TRAC. Thank you for your help.
Curious question : how can somebody login into a system using a password with the null byte character ? As it i... |
|
Incisive |
General Help
|
15 |
33,313 |
04-19-2013, 12:02 PM |
|
|
Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...
For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often. |
|
Incisive |
Old oclHashcat Support
|
9 |
34,157 |
07-22-2014, 05:25 AM |
|
|
Thread: hashcat-gui v0.5.0
Post: RE: hashcat-gui v0.5.0
Thank you very much for continuing to update the GUI! I've found it exceedingly helpful, both to actually run the hashcat programs easily, and to generate the command lines for later regression tests... |
|
Incisive |
Very old hashcat-GUI Announcements
|
5 |
36,817 |
01-16-2012, 05:34 PM |
|
|
Thread: mp64: generate total random words
Post: RE: mp64: generate total random words
A couple other random number generators that may be good sources for those that need them:
gpg --gen-random 2
openssl rand |
|
Incisive |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
20 |
42,461 |
05-21-2012, 06:09 PM |
|
|
Thread: SQL 2012 password hash
Post: SQL 2012 password hash
Please include the SQL 2012 password hash; it's identical to 2005, except
0x0200 as an ID instead of 0x0100
SHA-512 instead of SHA1
i.e. a sanitized test version run on SQL Server itself shows th... |
|
Incisive |
Feature Requests
|
11 |
42,563 |
08-17-2012, 11:45 PM |
|
|
Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash
Here's SQL2012 results for the hashcat example file A0.M1300.word:
SELECT example, pwdencrypt(example)
FROM
(SELECT 'carlos' AS example
UNION ALL SELECT 'test'
UNION ALL SELECT 'test1'
UNION ALL... |
|
Incisive |
Feature Requests
|
11 |
42,563 |
08-20-2012, 05:05 PM |
|
|
Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash
radix Wrote: (08-21-2012, 11:22 AM)
--
I've added this even though SQL documentation advises against using pwencrypt to hash passwords (bad admins will bad admin). Should be available in the next re... |
|
Incisive |
Feature Requests
|
11 |
42,563 |
08-21-2012, 11:46 PM |
|
|
Thread: Cisco ASA
Post: RE: Cisco ASA
fuzztester Wrote: (10-18-2012, 08:25 PM)
--
I checked out using the maskprocess and piping it in. It does work but I must say, the performance was no where near as fast as a straight brute force mode... |
|
Incisive |
Very old oclHashcat-plus Support
|
15 |
45,264 |
10-18-2012, 10:15 PM |
|
|
Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...
Thank you for looking into this, Atom. The speed drop is pretty significant, but the larger host memory requirement is just a budget issue for those that need to do that level of auditing.
Would i... |
|
Incisive |
Feature Requests
|
22 |
50,743 |
05-21-2012, 06:25 PM |
|
|
Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...
atom Wrote: (05-21-2012, 06:35 PM)
--
In theory yes, but then we would require special Kernels for each Hash-lenght (in steps of 4). If you take a look at the kernels directory, it would cause the pr... |
|
Incisive |
Feature Requests
|
22 |
50,743 |
06-07-2012, 07:17 AM |