Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[desc]
|
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
In my case the client and the server are the same PC. I am cracking 16800 hashes. I am getting around 400K h/s, so I can run through a dictionary file pretty quick, but when I add a rule to the dict... |
|
slawson |
hashcat
|
8 |
2,466 |
10-15-2019, 05:22 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: Cracked Passwords when using Brain
When using brain with multiple clients, what happens when a password is cracked by one of the stations?
1. Where does it store the cracked password?
2. Does it send a signal to all of th... |
|
slawson |
hashcat
|
9 |
2,494 |
10-16-2019, 10:19 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
Thx for answering that question. Of course, I have another (Give a mouse a cookie).
I'll try to explain.
(While using the brain feature)
If I run an attack on a file that has already been proc... |
|
slawson |
hashcat
|
9 |
2,494 |
10-16-2019, 10:51 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
That makes sense. Thanks. Although, I am still missing something. I am trying to unveil the potential in using brain.
My goal is to avoid duplicate candidates when running a rule against a hash ... |
|
slawson |
hashcat
|
9 |
2,494 |
10-17-2019, 06:10 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
Just the default which I understand to be -2.
To accomplish my goal, would I have to use -3. If so, I could see how that could take tons of storage.
Is -2 essentially a glorified --restore ... |
|
slawson |
hashcat
|
9 |
2,494 |
10-17-2019, 06:25 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
Sorry when I said -2 and -3 I meant brain client features 2 and 3. Not custom character sets.
So what I meant is that if I just use the default --brain-client-features 2, is that essentially just ... |
|
slawson |
hashcat
|
9 |
2,494 |
10-17-2019, 06:33 PM |
|
|
Thread: Brain Client won't quit
Post: Brain Client won't quit
I've got a strange issue going on. I am running the brain and client on the same PC. The client has been working with the default feature 2. On my last run I wanted to experiment with feature 3.... |
|
slawson |
hashcat
|
0 |
643 |
10-17-2019, 08:27 PM |
|
|
Thread: Running hashcat on multiple hash files
Post: Running hashcat on multiple hash files
Is there a way to do this? I tried this:
hashcat -m 16800 --show *.16800
This actually runs, but it only shows results for the first file in the directory. |
|
slawson |
General Talk
|
5 |
2,999 |
10-23-2019, 06:04 PM |
|
|
Thread: Running hashcat on multiple hash files
Post: RE: Running hashcat on multiple hash files
I did the Windows equivalent
copy /b *.16800 all.16800
That works, but I guess I was just curious if hashcat can handle multiple files at once. |
|
slawson |
General Talk
|
5 |
2,999 |
10-23-2019, 09:40 PM |
|
|
Thread: Creating Custom Password List
Post: Creating Custom Password List
Hopefully it is ok to ask this question here, but here it is.
I am trying to create a custom password list. The routers I am testing have a default password that uses the last 10 of LAN MAC. It... |
|
slawson |
General Talk
|
6 |
2,554 |
10-23-2019, 10:48 PM |
|
|
Thread: Creating Custom Password List
Post: RE: Creating Custom Password List
Never done that before, I'll see what I can find online. Thanks. |
|
slawson |
General Talk
|
6 |
2,554 |
10-23-2019, 11:18 PM |
|
|
Thread: Creating Custom Password List
Post: RE: Creating Custom Password List
Awesome. That's exactly what I was looking for. Thank you.
Since I have the MACs in a file this was my command:
for WLAN_MAC in $(cat macs.txt); do ETH_MAC=`printf '%x' $(( 0x$WLAN_MAC - 1 ))`... |
|
slawson |
General Talk
|
6 |
2,554 |
10-24-2019, 03:08 PM |
|
|
Thread: Creating Custom Password List
Post: RE: Creating Custom Password List
Thanks for the info. This little project worked wonderfully. |
|
slawson |
General Talk
|
6 |
2,554 |
10-25-2019, 04:03 PM |
|
|
Thread: Hashing Linux Passwords
Post: Hashing Linux Passwords
I am missing something simple, but I am not sure what. Here is what I have done so far.
made a copy of the /etc/passwd and /etc/shadow then typed:
unshadow passwd shadow > linux.txt
hashcat -... |
|
slawson |
hashcat
|
3 |
1,443 |
10-30-2019, 03:18 PM |
|
|
Thread: Hashing Linux Passwords
Post: RE: Hashing Linux Passwords
Nevermind I found it.
-m 500 |
|
slawson |
hashcat
|
3 |
1,443 |
10-30-2019, 03:21 PM |
|
|
Thread: Hashing Linux Passwords
Post: RE: Hashing Linux Passwords
|
slawson |
hashcat
|
3 |
1,443 |
10-30-2019, 03:27 PM |
|
|
Thread: Privilege Escalation Hash Type
Post: Privilege Escalation Hash Type
I am trying to learn about privilege escalation and at one point the tutorials says to try a registry search for passwords.
i.e.
reg query HKCU /f password /t REG_SZ /s
and
reg query ... |
|
slawson |
hashcat
|
7 |
2,031 |
11-08-2019, 12:28 AM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
Thanks for the article and mild rebuke. Actually I have been guilty of using the wrong terminology and my understanding is clearer now.
Although, in my question above I thought I asked a legitim... |
|
slawson |
hashcat
|
7 |
2,031 |
11-08-2019, 02:08 AM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
Here is one of the results from the registry pull.
HKEY_CURRENT_USER\Software\pdfforge\PDFCreator\Settings\ApplicationSettings\Accounts\TimeServerAccounts\0
Password REG_SZ xxxxxxmCO6g=
... |
|
slawson |
hashcat
|
7 |
2,031 |
11-08-2019, 03:51 PM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
Thanks for the info. I'll take a deeper look. |
|
slawson |
hashcat
|
7 |
2,031 |
11-08-2019, 07:17 PM |