Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Passwords from E-books
Post: RE: Passwords from E-books
I've been exploring this for a while, and the bigger picture is anything written or spoken that's "cute" enough to be a pass-phrase. There are a lot of articles about this out there, e.g. talking abou... |
|
Kgx Pnqvhm |
General Talk
|
2 |
4,000 |
03-23-2017, 12:07 AM |
|
|
Thread: Possibility of zip archive password cracking?
Post: RE: Possibility of zip archive password cracking?
gat3way_ Wrote: (02-04-2012, 11:33 PM)
--
Practically speaking, only dictionary attacks and rule-based attacks with limited keyspace are applicable, bruteforce or markov are pure madness.
[...]
Thu... |
|
Kgx Pnqvhm |
Feature Requests
|
27 |
130,517 |
02-05-2012, 09:37 PM |
|
|
Thread: Possibility of zip archive password cracking?
Post: RE: Possibility of zip archive password cracking?
Words from one dictionary added to words from another dictionary to make a string to be tested, with mangling rules for each dictionary.
Suppose one dictionary is bugs.txt and another is animals.tx... |
|
Kgx Pnqvhm |
Feature Requests
|
27 |
130,517 |
02-07-2012, 01:11 AM |
|
|
Thread: Possibility of zip archive password cracking?
Post: RE: Possibility of zip archive password cracking?
I'm looking for something more straightforward, like in the "Password Definition Language" of the Parallel Password Recovery program mentioned earlier in this thread. See 4.2.2. "Dictionary words and... |
|
Kgx Pnqvhm |
Feature Requests
|
27 |
130,517 |
02-07-2012, 11:04 PM |
|
|
Thread: Possibility of zip archive password cracking?
Post: RE: Possibility of zip archive password cracking?
Atom has already given his reasons why he won't be making the hashcats able to combine dictionaries with rules, and I realize that it would be a major code revision.
The point I keep bringing up is t... |
|
Kgx Pnqvhm |
Feature Requests
|
27 |
130,517 |
02-08-2012, 03:22 AM |
|
|
Thread: Possibility of zip archive password cracking?
Post: RE: Possibility of zip archive password cracking?
An example of that type of password is seen in the suspense novel I'm currently reading where an employee named Clayton Johnson in a Seattle company has the password of "JohnsonCLsonicsrule".
A com... |
|
Kgx Pnqvhm |
Feature Requests
|
27 |
130,517 |
02-11-2012, 03:18 PM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
M@LIK Wrote: (10-22-2012, 10:58 PM)
--
I suppose you are on Windows. Try with -r nul since you aren't using any actual rules.
--
Added rules from file nul: 0
Input.Mode: Dict (..\dicts\CainWordl... |
|
Kgx Pnqvhm |
Old hashcat Support
|
13 |
22,258 |
10-22-2012, 11:52 PM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
What I'm trying to do is find out how much longer a specific rule makes a particular combinator attack.
I was trying a "do nothing" rule as a start. |
|
Kgx Pnqvhm |
Old hashcat Support
|
13 |
22,258 |
10-23-2012, 01:14 AM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
How does this apply to exactly the same operation being done, the first with only -a 1 running for less than a minute, getting to 0.04% and displaying an ETC, while with -r it goes for even 10 minutes... |
|
Kgx Pnqvhm |
Old hashcat Support
|
13 |
22,258 |
10-23-2012, 08:58 PM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
I'm still trying to understand why for the same attack, hashcat does give an ETC for:
Progress..: 121/306706 (0.04%)
Yet adding -r (for a rule that just does ":" so is functionally the same as no ... |
|
Kgx Pnqvhm |
Old hashcat Support
|
13 |
22,258 |
10-24-2012, 11:34 PM |
|
|
Thread: Possible bug-no estimate if -a1 and -r
Post: RE: Possible bug-no estimate if -a1 and -r
atom Wrote: (10-25-2012, 09:13 AM)
--
You need at least (100 * nr-of-rules)/306706 in the progress to get an initial display.
--
(100 * 1)/306706 = 0.03%, yet in the example where I've reached 0.0... |
|
Kgx Pnqvhm |
Old hashcat Support
|
13 |
22,258 |
10-25-2012, 09:32 PM |
|
|
Thread: Praetorian's d3adhob0.rule
Post: RE: Praetorian's d3adhob0.rule
Yes, looking over the rest of them, they seem like 2010 KoreLogic rules. |
|
Kgx Pnqvhm |
General Talk
|
2 |
5,162 |
02-13-2016, 10:13 PM |
|
|
Thread: [solved] Problem sorting dictionary file
Post: RE: Problem sorting dictionary file
Somebody usually suggests ULM at this point.
https://unifiedlm.com/ |
|
Kgx Pnqvhm |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
6 |
11,931 |
04-20-2014, 06:00 PM |
|
|
Thread: rules with $4 or $9 and ^4 or ^9 dropped
Post: RE: rules with $4 or $9 and ^4 or ^9 dropped
Change the rule to
$0
$1
$2
$3
$4
$5
$6
$7
$8
$9
I get
word0
word1
word2
word3
word5
word6
word7
word8
in v0.38, Windows 64-bit version.
Changing the rule.txt file to
$1
$2
$3
$4
$5
$6
$7
$8
$9
$0... |
|
Kgx Pnqvhm |
Old hashcat Support
|
11 |
20,667 |
01-01-2012, 02:48 PM |
|
|
Thread: rules with $4 or $9 and ^4 or ^9 dropped
Post: RE: rules with $4 or $9 and ^4 or ^9 dropped
atom Wrote: (01-02-2012, 11:20 AM)
--
which cpu are you working on?
--
Intel(R) Core(TM) i3 CPU 550 @ 3.20GHz
Windows 7 Home Premium 64-bit SP1 |
|
Kgx Pnqvhm |
Old hashcat Support
|
11 |
20,667 |
01-02-2012, 01:50 PM |
|
|
Thread: splitlen shrinks dictionary size?
Post: RE: splitlen shrinks dictionary size?
Splitlen stops at 15 characters.
Try ULM. |
|
Kgx Pnqvhm |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
29,308 |
09-10-2013, 09:03 PM |
|
|
Thread: splitlen shrinks dictionary size?
Post: RE: splitlen shrinks dictionary size?
Now with oclHashcat going beyond the 15 up to 55 characters, can splitlen be recompiled as part of the official distribution? |
|
Kgx Pnqvhm |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
13 |
29,308 |
12-07-2013, 04:09 PM |
|
|
Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...
The way I request that is where dictionaries are supported, longer passwords should be, too.
Brute forcing beyond 15 characters isn't so productive, but working with dictionaries is.
It may be more fe... |
|
Kgx Pnqvhm |
Feature Requests
|
22 |
50,757 |
01-03-2012, 02:00 AM |
|
|
Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...
Maybe add a note in the wiki about the other hashcats that 'lite can do longer than 15 characters, though brute force only. |
|
Kgx Pnqvhm |
Feature Requests
|
22 |
50,757 |
01-11-2012, 11:57 PM |
|
|
Thread: Third-party utility: analyze_hc_restore
Post: RE: Third-party utility: analyze_hc_restore
Is this going to be updated for the recent hashcat v3 series? |
|
Kgx Pnqvhm |
User Contributions
|
3 |
7,403 |
12-03-2016, 04:07 PM |