Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: [Bug] Hashcat v0.41 & oclHashcat v0.09 crash
Post: [Bug] Hashcat v0.41 & oclHashcat v0.09 crash
Host computer:
- Motherboard ASUS P5K
- CPU Intel Q6600
- Video card AMD Radeon HD 5670
- Windows 7 x64
Reproduction (Hashcat v0.41):
- Run any of the applications with the following command... |
|
qweasd |
General Talk
|
2 |
7,415 |
12-07-2012, 11:15 PM |
|
|
Thread: Speed drops down by a half after a few seconds
Post: Speed drops down by a half after a few seconds
Hi,
When I run oclHashcat (plus or lite), the two AMD hc7900 GPUs run about at the same speed:
Ater 6s:
Code:
--
Session.Name...: oclHashcat-lite
Status.........: Running
Hash.Target....: ee... |
|
qweasd |
Very old oclHashcat-lite Support
|
1 |
6,402 |
07-11-2013, 05:35 AM |
|
|
Thread: Salted SHA-1 found by Lite but not by Plus
Post: Salted SHA-1 found by Lite but not by Plus
Hi folks, strange issue here...
I am using this input file as sha1($pass.$salt):
4205d56d3102258cc00b5eed8d13886225ebd618:134e012e33e18783de360103c1fb07798df0e1cf
When I run oclHashcat-lite64, ... |
|
qweasd |
Very old oclHashcat-plus Support
|
6 |
10,958 |
06-26-2013, 07:31 AM |
|
|
Thread: reuse restore file after upgrade (was oclHashcat v1.01)
Post: reuse restore file after upgrade (was oclHashcat v...
i was running a wpa session on 1.00, after updating to 1.01 I get:
ERROR: cannot use outdated att5.restore. Please remove it.
can't force it either. so 1.01 uses a different session file now? no w... |
|
qweasd |
Old oclHashcat Support
|
6 |
14,052 |
01-04-2014, 03:44 AM |
|
|
Thread: WPA/WPA2 Hash
Post: RE: WPA/WPA2 Hash
djzmaj Wrote: (12-07-2012, 08:05 PM)
--
I'm doing some kind of "reverse engineering" of aircrack-ng
--
This made my day.
aircrack-ng is open source. so why bother reverse engineering it? just gr... |
|
qweasd |
General Help
|
4 |
10,152 |
12-09-2012, 04:08 AM |
|
|
Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus
Hi atom,
Thanks for the reply. Can you explain what kind transformation oclHashcat lite applies to the hash it displays? I've tried with shorter salts, oclHashcat plus is able to crack them without... |
|
qweasd |
Very old oclHashcat-plus Support
|
6 |
10,958 |
07-02-2013, 09:07 AM |
|
|
Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus
Hey philsmd,
Good job on seeing that :) - And congrats on the sed kung-fu - I'll be able to script something up to revert the resulting hashes in the good format now.
Problem solved for now. |
|
qweasd |
Very old oclHashcat-plus Support
|
6 |
10,958 |
07-03-2013, 03:21 AM |
|
|
Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus
Here is the php version of it, if someone cares...
Code:
--
--
|
|
qweasd |
Very old oclHashcat-plus Support
|
6 |
10,958 |
07-03-2013, 03:28 AM |
|
|
Thread: Positive Hack Days - Hash Runner (writeup)
Post: RE: Positive Hack Days - Hash Runner (writeup)
Hey guys! Grats on winning. Can you provide a full list of hashes that you were challenged to crack, along with the passwords that you managed to retrieve? |
|
qweasd |
Organisation and Events
|
7 |
39,903 |
06-08-2012, 07:46 AM |
|
|
Thread: reuse restore file after upgrade (was oclHashcat v1.01)
Post: RE: oclHashcat v1.01
i'm on windows/32bit/cygwin so i changed the command to oclhashcat32.exe and after the 2nd command i get:
0+1 records in
0+1 records out
1 byte (1 B) copied, 0.241695 s, 0.0 kB/s
the last comman... |
|
qweasd |
Old oclHashcat Support
|
6 |
14,052 |
01-06-2014, 04:01 AM |
|
|
Thread: Issue with basic bruteforce
Post: RE: Issue with basic bruteforce
|
qweasd |
Very old oclHashcat-plus Support
|
2 |
5,879 |
10-30-2012, 10:43 PM |
|
|
Thread: EHD6420OR: clBuildProgram() -11
Post: RE: EHD6420OR: clBuildProgram() -11
Ah ok. I probably won't end up doing that as that's a laptop GPU and performance might be questionable. I wanted to compare it to this GTS 450 I have which with that command takes 11 days to complete.... |
|
qweasd |
Very old oclHashcat-plus Support
|
3 |
6,794 |
11-01-2012, 07:41 AM |
|
|
Thread: cudaHashcat-plus64 on Debian fails when using a known password
Post: RE: cudaHashcat-plus64 on Debian fails when using ...
I would like to point out that there is a CUDA version of aircrack-ng: https://trac.aircrack-ng.org/svn/branch/aircrack-ng-cuda/
i really doubt it's as fast as hashcat though. |
|
qweasd |
Very old oclHashcat-plus Support
|
6 |
13,958 |
12-09-2012, 04:16 AM |
|
|
Thread: auto length increment?
Post: RE: auto length increment?
M@LIK Wrote: (11-21-2012, 10:37 AM)
--
Add --pw-min=17 to your command-line.
--
worked brilliantly. Now the correct number of possibilities shows up(2^48).
One question I still have though. hash... |
|
qweasd |
Very old oclHashcat-lite Support
|
3 |
8,374 |
11-21-2012, 09:42 PM |
|
|
Thread: AMD driver issue
Post: RE: AMD driver issue
i upgraded to 13.12 from 13.9 on win7 and have the same error. use --force and got the -11 error eventually. maybe I should go back to 0.15 |
|
qweasd |
Old oclHashcat Support
|
21 |
44,834 |
12-24-2013, 09:43 AM |
|
|
Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion
Wow I never knew WPA2 used HMAC. I thought it was just a simple hash.
Still confused though.
Quote:
--
There is a final HMAC transformation which uses MD5 in WPA1 and SHA1 in WPA2 (its the on... |
|
qweasd |
General Talk
|
11 |
51,108 |
11-11-2012, 04:48 AM |
|
|
Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion
NeonFlash Wrote: (11-14-2012, 05:48 AM)
--
@pragmatic: Well done with the description :)
So, the rainbow tables you are referring to are precomputed PMKs which reduce the time significantly since ... |
|
qweasd |
General Talk
|
11 |
51,108 |
11-14-2012, 07:07 AM |
|
|
Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion
NeonFlash Wrote: (11-14-2012, 07:47 AM)
--
You could post supporting benchmarks as well :)
It should be faster than an attack without precomputed PMKs but slower than a rainbow table attack on uns... |
|
qweasd |
General Talk
|
11 |
51,108 |
11-14-2012, 10:32 AM |
|
|
Thread: no faster WPA2 cracking?
Post: no faster WPA2 cracking?
I know atom recently did a presentation on speeding up SHA1 hash generation which made me think that a similar thing was possible for WPA2 as it also uses SHA1. But then I saw this: https://twitter.co... |
|
qweasd |
General Talk
|
7 |
16,152 |
12-10-2012, 04:37 AM |
|
|
Thread: Issue with basic bruteforce
Post: Issue with basic bruteforce
using version 0.09, I tried using the wiki as a guide to bruteforce a WPA2 password but it's not working. the .bat file i am using only has
Code:
--
cudahashcat-plus64.exe -m 2500 capture.hccap ?d?d?... |
|
qweasd |
Very old oclHashcat-plus Support
|
2 |
5,879 |
10-30-2012, 10:31 PM |