Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: 32 Hash Characters
Post: RE: 32 Hash Characters
"Exhausted" just means that for whatever keyspace you're searching, the correct password wasn't in there. Unless you're *sure* that the password is using the mask you specified, you should now move o... |
|
womble |
hashcat
|
1 |
646 |
05-09-2020, 02:09 AM |
|
|
Thread: Atmoic Wallet
Post: RE: Atmoic Wallet
I doubt that Atomic Wallet is using a single round of unsalted MD5. How did you "convert the .dat file to a MD5 hash"? In any event, brute-forcing a 16 character passphrase, even straight MD5, is go... |
|
womble |
hashcat
|
2 |
224 |
09-22-2020, 06:22 AM |
|
|
Thread: Can semi broken gpu still work for hashcat?
Post: RE: Can semi broken gpu still work for hashcat?
A graphics card whose only fault is an inability to drive a monitor is OK for use with hashcat, *however* the number of things that can cause no display, but which don't impact GPU operation, are limi... |
|
womble |
Hardware
|
2 |
807 |
05-27-2020, 12:42 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
As a comparison:
$ hashcat --keyspace -a 3 ?a?a?a?a
857375
$ hashcat --keyspace -a 3 -1 ?l?u?d ?1?1?1?1
238328
So you're doing about 4x as much work by using ?a?a?a?a. Probably not enough of... |
|
womble |
hashcat
|
7 |
1,523 |
05-10-2020, 04:20 PM |
|
|
Thread: Doing Works In Pc can give wrong results When Cracking
Post: RE: Doing Works In Pc can give wrong results When ...
Doing other things on the machine that is running hashcat will not produce incorrect results. It will only reduce the speed of cracking. |
|
womble |
hashcat
|
1 |
535 |
05-18-2020, 07:21 AM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
Off the top of my head...
-1 123456789 -2 0123456789- -3 abcdABCD0123456789- -4 abcdABCD0123456789 ?1?2?3?4?4?4?4?4?4(etc) |
|
womble |
General Talk
|
8 |
2,054 |
05-29-2020, 04:10 AM |
|
|
Thread: Hashcat not recognizing my GPU
Post: RE: Hashcat not recognizing my GPU
"The pocl project"
That's not likely to work well. I've had terrible trouble with POCL getting in the way of my other OpenCL configs, and I've basically blacklisted it from my systems now, it's mo... |
|
womble |
hashcat
|
7 |
1,354 |
05-23-2020, 09:15 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
What exactly do you need help with? If it's interpreting the algorithm description, if I'm reading the description correctly, in pseudocode, what they're describing looks something like this:
b1 =... |
|
womble |
hashcat
|
19 |
3,624 |
05-08-2020, 03:43 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
Romeo3442 Wrote: (05-09-2020, 11:32 PM)
--
Correct, I am looking for help developing a module to attack this particular implementation. Is this a good place to request or on Github? I am not savv... |
|
womble |
hashcat
|
19 |
3,624 |
05-10-2020, 03:45 PM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
That decoding is really helpful -- if the "Folded MD5 of salt+key" is what it sounds like, that'd be the ticket be able to detect whether you've got the correct passphrase -- or at least a good candid... |
|
womble |
hashcat
|
19 |
3,624 |
05-15-2020, 05:27 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
You really helped doing that decode and annotation -- made the whole thing pretty easy. Like you, I got misled by the source, by the use of the word "key" with reference to the MD5 check (in the call... |
|
womble |
hashcat
|
19 |
3,624 |
05-15-2020, 07:46 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
philsmd Wrote: (05-15-2020, 08:39 AM)
--
@womble, do you plan on sharing your hashcat module and opening a pull request (PR) on github ?
--
Yes, although I'm in no hurry given that my other PRs don... |
|
womble |
hashcat
|
19 |
3,624 |
05-15-2020, 11:38 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
philsmd Wrote: (05-15-2020, 12:59 PM)
--
oh... are you mpalmer on github ? yeah, I see that there are some still open PRs, I think atom/jsteube is busy a lot, but I will try to ping him on IRC etc. n... |
|
womble |
hashcat
|
19 |
3,624 |
05-16-2020, 03:55 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
I've made your bit of python redundant, I'm afraid -- but on the upside, false positives should be a thing of the past! You'll want to use https://github.com/mpalmer/bfacs2hashcat to extract the hash... |
|
womble |
hashcat
|
19 |
3,624 |
05-19-2020, 04:07 PM |
|
|
Thread: i9-9900K, GTX 1080 Ti Gaming X 11G
Post: RE: i9-9900K, GTX 1080 Ti Gaming X 11G
hashcat --benchmark -m 13600 should work -- no need to post hashes. |
|
womble |
Hardware
|
9 |
2,723 |
05-19-2020, 04:24 AM |
|
|
Thread: Looking to crack password on AppleSecureNote
Post: RE: Looking to crack password on AppleSecureNote
It means that you need to pass the location of the file that contains the secure note data (which is probably somewhere on your system named NoteStore.sqlite) as an argument to the script. Try runni... |
|
womble |
hashcat
|
5 |
807 |
08-03-2020, 11:59 AM |
|
|
Thread: LUKS version 2
Post: RE: LUKS version 2
Loopy Wrote: (07-22-2020, 06:45 PM)
--
I think the crux of my problem can be answered with one question: Does Hashcat have support for LUKS2 built into mode 14600?
--
No. Here's the Github issue:... |
|
womble |
hashcat
|
2 |
604 |
07-23-2020, 09:27 AM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
I believe NewEgg has them. |
|
womble |
hashcat
|
6 |
1,451 |
05-09-2020, 02:04 AM |
|
|
Thread: Password recovery - 3 attack avenues?
Post: RE: Password recovery - 3 attack avenues?
The size of the data being cracked does not generally change the difficulty of cracking the passphrase. It doesn't look like pCloud is something that hashcat can crack, so it's down to either Veracry... |
|
womble |
General Talk
|
4 |
1,100 |
05-18-2020, 07:27 AM |
|
|
Thread: Password recovery - 3 attack avenues?
Post: RE: Password recovery - 3 attack avenues?
... and that is why you don't pre-generate brute-force datasets. |
|
womble |
General Talk
|
4 |
1,100 |
05-19-2020, 04:25 AM |