Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Creating Custom Password List
Post: RE: Creating Custom Password List
Thanks for the info. This little project worked wonderfully. |
|
slawson |
General Talk
|
6 |
2,557 |
10-25-2019, 04:03 PM |
|
|
Thread: Creating Custom Password List
Post: Creating Custom Password List
Hopefully it is ok to ask this question here, but here it is.
I am trying to create a custom password list. The routers I am testing have a default password that uses the last 10 of LAN MAC. It... |
|
slawson |
General Talk
|
6 |
2,557 |
10-23-2019, 10:48 PM |
|
|
Thread: CL_INVALID_BUFFER_SIZE
Post: CL_INVALID_BUFFER_SIZE
I have a 20GB NTLM hash file that I am testing with and I get the error CL_INVALID_BUFFER_SIZE. Is there a maximum number of hashes that can be processed in one job? |
|
slawson |
hashcat
|
7 |
2,802 |
08-16-2019, 08:57 PM |
|
|
Thread: CL_INVALID_BUFFER_SIZE
Post: RE: CL_INVALID_BUFFER_SIZE
I have a Dual 8-core XEON, 128GB RAM, and dual R9-290x Video Cards. Any suggestion on a good starting point for the split? |
|
slawson |
hashcat
|
7 |
2,802 |
08-16-2019, 09:03 PM |
|
|
Thread: CL_INVALID_BUFFER_SIZE
Post: RE: CL_INVALID_BUFFER_SIZE
It accepted it at 3GB file size.
I do have a question though. If I do a benchmark on my system it shows 43,000,000 H/s. When I processed my 3GB file the speed went down to about 3,000 H/s. I t... |
|
slawson |
hashcat
|
7 |
2,802 |
08-16-2019, 10:49 PM |
|
|
Thread: CL_INVALID_BUFFER_SIZE
Post: RE: CL_INVALID_BUFFER_SIZE
Thanks for that info. Is there a sweet spot as far as the number of hashes that Hashcat can efficiently process at one time? |
|
slawson |
hashcat
|
7 |
2,802 |
08-16-2019, 10:58 PM |
|
|
Thread: Privilege Escalation Hash Type
Post: Privilege Escalation Hash Type
I am trying to learn about privilege escalation and at one point the tutorials says to try a registry search for passwords.
i.e.
reg query HKCU /f password /t REG_SZ /s
and
reg query ... |
|
slawson |
hashcat
|
7 |
2,033 |
11-08-2019, 12:28 AM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
Thanks for the article and mild rebuke. Actually I have been guilty of using the wrong terminology and my understanding is clearer now.
Although, in my question above I thought I asked a legitim... |
|
slawson |
hashcat
|
7 |
2,033 |
11-08-2019, 02:08 AM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
Here is one of the results from the registry pull.
HKEY_CURRENT_USER\Software\pdfforge\PDFCreator\Settings\ApplicationSettings\Accounts\TimeServerAccounts\0
Password REG_SZ xxxxxxmCO6g=
... |
|
slawson |
hashcat
|
7 |
2,033 |
11-08-2019, 03:51 PM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
Thanks for the info. I'll take a deeper look. |
|
slawson |
hashcat
|
7 |
2,033 |
11-08-2019, 07:17 PM |
|
|
Thread: Migrating Brain Server Data
Post: Migrating Brain Server Data
How do I or is it necessary to migrate the saved brain server data to newer versions as they come out? |
|
slawson |
hashcat
|
8 |
2,469 |
10-11-2019, 05:27 PM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
Thanks for the replies. Where is the brain data actually stored? |
|
slawson |
hashcat
|
8 |
2,469 |
10-15-2019, 03:46 PM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
Please correct me if I am wrong. I don't have any .ldmp files in my directory, only .admp. I assume this is because I didn't specify any client features, therefore it only stored attack postitions.
... |
|
slawson |
hashcat
|
8 |
2,469 |
10-15-2019, 04:57 PM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
In my case the client and the server are the same PC. I am cracking 16800 hashes. I am getting around 400K h/s, so I can run through a dictionary file pretty quick, but when I add a rule to the dict... |
|
slawson |
hashcat
|
8 |
2,469 |
10-15-2019, 05:22 PM |
|
|
Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?
hashcat64 -m 2500 --show yourhccapxfilename (will show you any cracked passwords)
hashcat64 -m 2500 --left yourhccapxfilename (will show you any un-cracked passwords) |
|
slawson |
hashcat
|
9 |
3,246 |
09-04-2019, 05:40 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: Cracked Passwords when using Brain
When using brain with multiple clients, what happens when a password is cracked by one of the stations?
1. Where does it store the cracked password?
2. Does it send a signal to all of th... |
|
slawson |
hashcat
|
9 |
2,496 |
10-16-2019, 10:19 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
Thx for answering that question. Of course, I have another (Give a mouse a cookie).
I'll try to explain.
(While using the brain feature)
If I run an attack on a file that has already been proc... |
|
slawson |
hashcat
|
9 |
2,496 |
10-16-2019, 10:51 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
That makes sense. Thanks. Although, I am still missing something. I am trying to unveil the potential in using brain.
My goal is to avoid duplicate candidates when running a rule against a hash ... |
|
slawson |
hashcat
|
9 |
2,496 |
10-17-2019, 06:10 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
Just the default which I understand to be -2.
To accomplish my goal, would I have to use -3. If so, I could see how that could take tons of storage.
Is -2 essentially a glorified --restore ... |
|
slawson |
hashcat
|
9 |
2,496 |
10-17-2019, 06:25 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
Sorry when I said -2 and -3 I meant brain client features 2 and 3. Not custom character sets.
So what I meant is that if I just use the default --brain-client-features 2, is that essentially just ... |
|
slawson |
hashcat
|
9 |
2,496 |
10-17-2019, 06:33 PM |