Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: DECRYPTUM
Post: RE: DECRYPTUM
Very cool, what are you using this beast of a machine for?
Ah I see it's a commercial device on https://www.decryptum.com/ (https://www.decryptum.com/) |
|
DanielG |
Hardware
|
12 |
1,219 |
09-16-2020, 10:07 AM |
|
|
Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt
First step is to have a test password that you know so you can test your hypothesis.
Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex... |
|
DanielG |
hashcat
|
4 |
1,105 |
03-19-2020, 04:14 PM |
|
|
Thread: Intercept zip decryption key or files from an application
Post: RE: Intercept zip decryption key or files from an ...
Yes but it heavily depends on the application and how you have access to it. You can decompile the application and look for the password, debug the running application, run a trace on calls that are b... |
|
DanielG |
General Talk
|
1 |
719 |
03-12-2020, 05:33 PM |
|
|
Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing
Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788 |
|
DanielG |
User Contributions
|
4 |
2,758 |
03-04-2020, 10:10 AM |
|
|
Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow
Ulfr11 Wrote: (02-27-2020, 04:36 AM)
--
?h is much faster mask than ?a in brute Force attacks
--
Yes, counting to 10 is faster than counting to 100. |
|
DanielG |
hashcat
|
5 |
1,805 |
02-27-2020, 02:48 PM |
|
|
Thread: Need help to identify encryption
Post: RE: Need help to identify encryption
On a lot of "Default Usernames & Passwords" lists for routers Huawei devices seem to have the password 'admin' or '[email protected]' as the password. Perhaps try that before trying to break the config... |
|
DanielG |
hashcat
|
2 |
1,119 |
02-10-2020, 11:52 AM |
|
|
Thread: Pantagrule, a really large last-resort ruleset
Post: RE: Pantagrule, a really large last-resort ruleset
Cool, thanks for your contribution. I added it to my rules/ folder. Always nice to have different rulesets based on real world data. |
|
DanielG |
User Contributions
|
2 |
1,659 |
01-14-2020, 01:34 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
|
DanielG |
hashcat
|
11 |
8,613 |
01-09-2020, 09:48 AM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
okay, googling a bit more it seems the format is pretty open. The fileformat is described on https://www.aescrypt.com/aes_file_format.html and there is source on https://github.com/kenkendk/sharpaescr... |
|
DanielG |
General Talk
|
20 |
5,128 |
01-08-2020, 10:18 AM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
on the official forum there is a topic about bruteforce a forgotten password on https://forums.packetizer.com/viewtopic.php?f=72&t=1333 there is a slow python version using the tool itself but a user ... |
|
DanielG |
General Talk
|
20 |
5,128 |
01-08-2020, 09:56 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting. |
|
DanielG |
hashcat
|
11 |
8,613 |
01-06-2020, 05:50 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
"My thinking was to crack the old NTLM hash, key it into AD"
I think you can change it back without knowing what the old password was. You can set the old NTLM hash with
lsadump::ChangeNTLM /server:A... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 05:19 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
I don't get what your goal is here, any domain admin can change the password of the account so that is your best option.
You don't need to crack the NTLM hash for most other 'less-ethical' use cas... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 09:43 AM |
|
|
Thread: VNC challenge response password crack
Post: RE: VNC challenge response password crack
Wow very cool, according to https://en.wikipedia.org/wiki/Virtual_Network_Computing there are different protocols used by different VNC clients. Which protocol / clients use this particular method of ... |
|
DanielG |
User Contributions
|
2 |
2,609 |
12-18-2019, 04:34 PM |
|
|
Thread: Advice for Reviving Old Machine for Hashcat
Post: RE: Advice for Reviving Old Machine for Hashcat
Before buying hardware make sure cracking is feasible. What do you know about the password for the truecrypt container? If you only know it is 20 characters for example you will never crack it. But if... |
|
DanielG |
hashcat
|
5 |
1,621 |
12-12-2019, 10:33 AM |
|
|
Thread: Masking question
Post: RE: Masking question
https://hashcat.net/wiki/doku.php?id=mask_attack
Quote:
--
A placeholder can be either a custom charset variable, a built-in charset variable or a static letter
--
so yeah, just a?a?a?a?a?a?a?... |
|
DanielG |
hashcat
|
2 |
1,142 |
11-01-2019, 04:03 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind looks cool, https://www.techsolvency.com/pub/bin/mdxfind/
"Multi-iteration: can try thousands of iteration counts of any of these core algorithms".
On https://www.techsolvency.com/pub/bin/... |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 12:24 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
1. know exactly how many times it is hashed (3,4,5,etc)
2. write a custom kernel that can handle the exact amount of md5 rounds |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 10:01 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities.
These guys at www.onlinehashcrack.c... |
|
DanielG |
hashcat
|
4 |
1,655 |
10-21-2019, 08:51 AM |
|
|
Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $
Cool, nice way you found that out too |
|
DanielG |
General Talk
|
4 |
1,671 |
09-25-2019, 09:17 AM |