Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: AES/Rijndael expert needed
Post: RE: AES/Rijndael expert needed
gat3way Wrote: (06-04-2012, 03:06 PM)
--
Much better idea would be to use a key derivation function like PBKDF2 with ïnitial symmetric key as salt with some good iterations count. Applying the pas... |
|
Incisive |
Feature Requests
|
5 |
14,069 |
06-07-2012, 07:10 AM |
|
|
Thread: 7970 reaches 90 celsius
Post: RE: 7970 reaches 90 celsius
+1 on better cooling for both the card and the case - cold air in, over the heat sinks, hot air out. Arctic has a great reputation, and it's really not that difficult to swap out the cooler. Also, t... |
|
Incisive |
General Help
|
4 |
12,902 |
03-24-2013, 01:19 AM |
|
|
Thread: oclHashcat-plus v0.06 - add support for md5($pass.$salt)
Post: RE: oclHashcat-plus v0.06 - add support for md5($p...
Could this be alleviated instead by a documentation change?
for instance:
md5($pass.$salt): Joomla vX1 to vY1+, App2 vX2 to vY2+, App3 vX3 to vY3+. This is a single md5 hash of the password and s... |
|
Incisive |
Very old oclHashcat-plus Support
|
5 |
12,825 |
12-20-2011, 04:49 PM |
|
|
Thread: Creating a secure hash?
Post: RE: Creating a secure hash?
As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT.
For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u... |
|
Incisive |
General Talk
|
6 |
12,456 |
01-24-2014, 09:50 PM |
|
|
Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: PBKDF2/RFC2898/PKCS#5 modes?
As a less immediate, longer term project, I'd like to request generic PBKDF2 (also known as RFC2898 and PKCS#5) support, in whichever applications can reasonably support it. For hash algorithms, I'd ... |
|
Incisive |
Feature Requests
|
3 |
12,258 |
08-22-2012, 06:28 PM |
|
|
Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: RE: PBKDF2/RFC2898/PKCS#5 modes?
Aside from some applications following the OWASP Password Storage Cheat Sheet:
Django web framework
https://code.djangoproject.com/ticket/15367
https://www.levigross.com/post/18880148948/a-review-of... |
|
Incisive |
Feature Requests
|
3 |
12,258 |
08-27-2012, 10:45 PM |
|
|
Thread: Cracking MSSQL(2005) hashes
Post: RE: Cracking MSSQL(2005) hashes
On the SQL Servers you are authorized to audit:
SELECT sys.syslogins.name
, sys.server_principals.type
, LOGINPROPERTY(sys.syslogins.name,'PasswordHash') AS HashcatFormat
, UPPER(RIGHT(sys.fn_va... |
|
Incisive |
Very old oclHashcat-plus Support
|
2 |
12,195 |
12-16-2011, 11:27 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: oclhashcat-Plus64.exe 0.14 permission denied, "sto...
Running some tests on the linkedin hash list, with oclhashcat-Plus4 in brute force mode (3), using --remove and --outfile-format=7, at some points when many hashes are being cracked quickly, I'll see ... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-30-2013, 11:34 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...
This error appears to be highly correlated with https://hashcat.net/forum/thread-2182-post-13101.html, "oclhashcat-Plus64.exe 0.14 bizzare output sections". |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-31-2013, 05:23 AM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...
Got it, and I'll put it in the Trac as well.
https://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php (https://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php)
unmasked-100, a.k.a. unmask... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-31-2013, 08:54 PM |
|
|
Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...
https://hashcat.net/trac/ticket/111 (https://hashcat.net/trac/ticket/111) |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
10,852 |
03-31-2013, 09:10 PM |
|
|
Thread: How should I store my users passwords in my DB?
Post: RE: How should I store my users passwords in my DB...
1) Don't enforce a short maximum length - you're storing a hash, so if they want to use an epic passpoem, let them. The lower the number of scrypt or PBKDF2 iterations, the longer the minimum length ... |
|
Incisive |
General Help
|
4 |
10,284 |
07-19-2012, 08:57 PM |
|
|
Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...
If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes.
The archived thread on SQL Server 2012 hashes is at:
https://hashcat.net/foru... |
|
Incisive |
General Talk
|
3 |
9,888 |
04-04-2014, 04:12 PM |
|
|
Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...
It's still using the 0x200 identifier; I just double-checked. |
|
Incisive |
General Talk
|
3 |
9,888 |
04-07-2014, 04:23 AM |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?
Finding blank passwords is indeed a feature, and a very important and welcome one!
Not finding any other hashes, however, is a bug :(. |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-27-2012, 05:05 PM |
|
|
Thread: Hashcat 0.41 mode 1731 fails?
Post: Hashcat 0.41 mode 1731 fails?
On hashcat 0.41 I'm not getting successful results (except with an apparent blank password) with -m 1731 on either your example hashes or even my own tests.
Intel Core i7-2600
Code:
--
hashca... |
|
Incisive |
Old hashcat Support
|
5 |
8,980 |
09-26-2012, 05:40 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-18-2013, 04:30 AM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...
Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-19-2013, 12:32 PM |
|
|
Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...
I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes.
Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,933 |
04-17-2013, 05:10 AM |
|
|
Thread: restarting dictionary with rules
Post: RE: restarting dictionary with rules
atom Wrote: (06-11-2012, 09:31 AM)
--
No, only oclHashcat-lite can do this. oclHashcat-plus is designed for short runs.
--
I don't know if it's possible, and I understand there are some technical i... |
|
Incisive |
Very old oclHashcat-plus Support
|
4 |
8,429 |
06-11-2012, 09:56 PM |