Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Nvidia GTX Titan X Benchmarks
Post: RE: Nvidia GTX Titan X Benchmarks
Well damn, and I thought I was going to be the bad kid on the block with the 8 980s I just got....
Guess I just have to start making the case for an upgrade already on next years budget. |
|
Shady_Wushu |
Hardware
|
22 |
65,475 |
04-22-2015, 02:48 PM |
|
|
Thread: Requested advice for hardware
Post: RE: Requested advice for hardware
If you want documentation, go back through the hardware forum and look at some of the posts from around when the 980s came out. Epixoip and others who managed to get 980s right when they were release... |
|
Shady_Wushu |
Hardware
|
8 |
12,604 |
04-23-2015, 02:47 PM |
|
|
Thread: Requested advice for hardware
Post: RE: Requested advice for hardware
*facepalm* Doh.
Noted for the future. |
|
Shady_Wushu |
Hardware
|
8 |
12,604 |
04-23-2015, 07:21 PM |
|
|
Thread: Odd Bruteforce Issue
Post: Odd Bruteforce Issue
So I just put together a Tyan machine with 8 980s, and I've been running a big domain we had captured in a previous engagement as a test.
With the 8 cards we can brute force 7-character NTLM pretty... |
|
Shady_Wushu |
Old oclHashcat Support
|
8 |
11,492 |
04-17-2015, 08:21 PM |
|
|
Thread: Odd Bruteforce Issue
Post: RE: Odd Bruteforce Issue
Thanks for the advice guys. I'll kick off a bug report on Trac with my exact command history and the results I was seeing.
I went back and reran a 7 character brute with the exact same command I h... |
|
Shady_Wushu |
Old oclHashcat Support
|
8 |
11,492 |
04-22-2015, 02:35 PM |
|
|
Thread: Odd Bruteforce Issue
Post: RE: Odd Bruteforce Issue
Ticket #615 was submitted. I tried a test using a set of 396 randomly generated 7 character passwords that were then hashed into NTLM. When I ran them using:
./cudaHashcat64.bin -a 3 -m 1000 /pat... |
|
Shady_Wushu |
Old oclHashcat Support
|
8 |
11,492 |
04-22-2015, 03:54 PM |
|
|
Thread: Odd Bruteforce Issue
Post: RE: Odd Bruteforce Issue
So I guess this issue is already being taken care of in 1.36. philsmd confirmed in my Trac ticket that this fix has been implemented in 1.36. So yay!
Any word on a release date for 1.36? I have ... |
|
Shady_Wushu |
Old oclHashcat Support
|
8 |
11,492 |
04-22-2015, 06:24 PM |
|
|
Thread: Favorite Rules?
Post: RE: Favorite Rules?
It depends on the hash type and which system I am using to crack (and therefore how much speed I can get), but my default rules files are d3ad0ne and generated2. On my fast server, I'll generate a fe... |
|
Shady_Wushu |
Old oclHashcat Support
|
2 |
4,478 |
04-27-2015, 10:06 AM |
|
|
Thread: Extracting binary data from TrueCrypt Boot Volume and Cracking
Post: RE: Extracting binary data from TrueCrypt Boot Vol...
I already realized the error I made. dd should be:
dd if=/dev/sdc of=/path/to/file.tc bs=512 skip=62 count=1
I reversed count and bs, and skip should be number of sectors rather than bytes. |
|
Shady_Wushu |
Old oclHashcat Support
|
5 |
8,270 |
08-04-2015, 10:48 PM |
|
|
Thread: Extracting binary data from TrueCrypt Boot Volume and Cracking
Post: RE: Extracting binary data from TrueCrypt Boot Vol...
I thought skip uses the ibs rather than the bs, and ibs defaults to 512. I could be wrong though. |
|
Shady_Wushu |
Old oclHashcat Support
|
5 |
8,270 |
08-05-2015, 02:23 PM |
|
|
Thread: Extracting binary data from TrueCrypt Boot Volume and Cracking
Post: RE: Extracting binary data from TrueCrypt Boot Vol...
So I'm sure I have the right dd command for a boot volume now. However, it turns out this is simply an encrypted physical drive, not a system drive - why you'd do that to a 2 TB external USB is beyon... |
|
Shady_Wushu |
Old oclHashcat Support
|
5 |
8,270 |
08-05-2015, 03:33 PM |
|
|
Thread: 12 character WPA2 password
Post: RE: 12 character WPA2 password
Practically speaking, a 12 character WPA2 key is going to be difficult to crack. The WPA2 hash cracks relatively slowly, at least compared with other hashes. 12 characters presents a pretty large k... |
|
Shady_Wushu |
Old oclHashcat Support
|
5 |
10,819 |
05-04-2015, 02:59 PM |
|
|
Thread: Extracting binary data from TrueCrypt Boot Volume and Cracking
Post: Extracting binary data from TrueCrypt Boot Volume ...
I've recently been asked to give a shot at cracking a TrueCrypt boot volume. Having never done so before, I just wanted to sanity check what I've done.
To extract the binary data needed for the c... |
|
Shady_Wushu |
Old oclHashcat Support
|
5 |
8,270 |
08-04-2015, 10:06 PM |
|
|
Thread: Extracting binary data from TrueCrypt Boot Volume and Cracking
Post: RE: Extracting binary data from TrueCrypt Boot Vol...
Figured it out, just pulled the first 512 on the disk. |
|
Shady_Wushu |
Old oclHashcat Support
|
5 |
8,270 |
08-05-2015, 03:58 PM |
|
|
Thread: Nvidia Error cracking RAR hash
Post: Nvidia Error cracking RAR hash
I've been getting an error when trying to crack a RAR hash in cudaHashcat64.
Once the crack runs for about 10 minutes, it dumps me out with a "ERROR cuSteamSynchronize () 700"
I hit the status r... |
|
Shady_Wushu |
Old oclHashcat Support
|
1 |
3,657 |
09-18-2015, 11:19 PM |