Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Building 8GPU cracking station question
Post: RE: Building 8GPU cracking station question
epixoip Wrote: (06-19-2019, 04:03 PM)
--
cybhashcat Wrote: (06-19-2019, 02:13 PM)
--
i am unsure where to acquire the experience, aside from bothering the good people of this forum.
--
By all mean... |
|
cybhashcat |
Hardware
|
16 |
10,014 |
06-23-2019, 12:04 PM |
|
|
Thread: How to crack AEM/CQ sha256 hash?
Post: How to crack AEM/CQ sha256 hash?
Hey guys,
in AEM (Adobe Experience Manager), I can see the the following data on every app user:
rep:password "{SHA-256}fe90d85cdcd7e79c-1000-ef182cdc47e60b472784e42a6e167d26242648c6b2e063dfd9e27e... |
|
cybhashcat |
hashcat
|
5 |
5,002 |
05-01-2018, 02:04 PM |
|
|
Thread: Uncrackable changing LANMAN Hashes?
Post: Uncrackable changing LANMAN Hashes?
Hey Friends,
so, this isn't a HASHCAT issue even though at first i thought it was - because no LM hash out of the two last NTDS.dit files we opened has cracked.
however, after when we used both DC... |
|
cybhashcat |
hashcat
|
0 |
1,472 |
04-22-2018, 10:46 AM |
|
|
Thread: Mode 7 (Hybrid Mask + Wordlist) only using 1 GPU?
Post: Mode 7 (Hybrid Mask + Wordlist) only using 1 GPU?
Hey guys.
odd thing here, for some reason with using -a 7, only one GPU is active:
Code:
--
Session..........: hashcat
Status...........: Running
Hash.Type........: NTLM
Hash.Target......: Cra... |
|
cybhashcat |
hashcat
|
1 |
2,060 |
05-14-2018, 01:51 PM |
|
|
Thread: "Not enough allocatable device memory for this attack."
Post: "Not enough allocatable device memory for this att...
Hey Guys,
so i saw a post on Twitter - a person was able to obtain 102 GH/s on a 2080ti.
i wanted to emulate this on my 4x1080 build, but i am a rookie in this, and i'm getting an error:
Quote... |
|
cybhashcat |
hashcat
|
2 |
1,892 |
06-19-2019, 12:32 AM |
|
|
Thread: Sorting many masks by number of combinations?
Post: Sorting many masks by number of combinations?
Hey guys,
As a part of my work we sometimes have hundreds of thousands of hashes, and at the end of our cracking we use a tool that calculates all of the cracked passwords into Masks (i wouldn't mind... |
|
cybhashcat |
hashcat
|
2 |
805 |
04-30-2020, 02:03 PM |
|
|
Thread: What is the default bruteforce charset?
Post: What is the default bruteforce charset?
Hello!
i can't seem to find the answer to this anywhere...
when i do the simple command:
oclHashcat64.exe -m 300 -a 3 E:\Hash\hash.txt
in the hopes of bruteforcing a password, is it only the "ba... |
|
cybhashcat |
Old oclHashcat Support
|
4 |
14,794 |
05-16-2015, 01:07 AM |
|
|
Thread: What is the default bruteforce charset?
Post: RE: What is the default bruteforce charset?
epixoip Wrote: (05-16-2015, 05:19 AM)
--
Default values are found here: https://hashcat.net/wiki/doku.php?id=oclhashcat#default_values
So for -a 3:
Quote:
--
-1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1... |
|
cybhashcat |
Old oclHashcat Support
|
4 |
14,794 |
05-16-2015, 12:55 PM |
|
|
Thread: What is the default bruteforce charset?
Post: RE: What is the default bruteforce charset?
epixoip Wrote: (05-16-2015, 08:41 PM)
--
No, that mask would only brute force passwords with a length of 1. Actually it wouldn't do anything because your arguments are in the wrong order. If you want... |
|
cybhashcat |
Old oclHashcat Support
|
4 |
14,794 |
05-16-2015, 09:39 PM |