Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw
roomtoetje Wrote: (05-21-2018, 07:20 PM)
--
In the device is a license system that grants an amount of treatments.
The license keys were always free when you bought disposables/supplies from the c... |
|
DanielG |
hashcat
|
6 |
5,011 |
05-22-2018, 03:15 PM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like. |
|
DanielG |
hashcat
|
14 |
19,727 |
06-28-2018, 04:08 PM |
|
|
Thread: Hashcat wont start cracking [noob]
Post: RE: Hashcat wont start cracking [noob]
cesalbaral Wrote: (07-24-2018, 01:51 PM)
--
Be more specific. Did the program not start? You need to run the program by starting it on terminal/cmd not by clicking on it's icon. If the cracking didn... |
|
DanielG |
hashcat
|
8 |
7,990 |
07-24-2018, 02:16 PM |
|
|
Thread: Easy password with runic
Post: RE: Easy password with runic
Hashcat can bruteforce any input bytes, so theoretically yes. |
|
DanielG |
hashcat
|
6 |
3,550 |
07-27-2018, 09:58 AM |
|
|
Thread: Easy password with runic
Post: RE: Easy password with runic
The brute-force attack mode (https://hashcat.net/wiki/doku.php?id=mask_attack) allows the use of ?b which are all the bytes 0x00 through 0xff. So that would be a way, although probably very ineffici... |
|
DanielG |
hashcat
|
6 |
3,550 |
07-27-2018, 10:19 AM |
|
|
Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw
roomtoetje Wrote: (05-22-2018, 07:38 PM)
--
DanielG Wrote: (05-22-2018, 03:15 PM)
--
If you just input the base-64 data and the device knows it is "iFlap with 30 Delta" then it is most likely not a ... |
|
DanielG |
hashcat
|
6 |
5,011 |
05-23-2018, 05:14 AM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
If they store the passwords locally they seem to use "the strongly secure SHA format"
https://manuals.gfi.com/en/kerio/connect/content/assets/add_user.png
https://manuals.gfi.com/en/kerio/connect/... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-12-2018, 01:05 PM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Awesome debugging powers to get that info! Seems to be 3DES indeed with key "61d0e54954733b8080808080808080808080808080808080".
Decoding D3S:8742ddf7db1906c5d54ec948c500e587adfa4447eff8dc42adfa4447... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 09:36 AM |
|
|
Thread: SHA-256 Base-64 (?)
Post: RE: SHA-256 Base-64 (?)
You can just attack it as any other hash? I think you will need to be more specific on what isn't clear.
For example, to attack sha-256 you need mode 1400 (https://hashcat.net/wiki/doku.php?id=exam... |
|
DanielG |
hashcat
|
1 |
2,416 |
07-03-2018, 09:17 AM |
|
|
Thread: Disable Cracking performance lower than expected?
Post: RE: Disable Cracking performance lower than expect...
yeah, get the source code off github, change the part of the code that does that, compile hashcat, no more message. |
|
DanielG |
hashcat
|
3 |
3,345 |
07-29-2018, 01:13 PM |
|
|
Thread: error v4.1.0
Post: RE: error v4.1.0
Is it also possible that hashcat has been extracted to a folder where an admin has rights but a user does not? So if you unzip hashcat using Admin account but start command prompt using normal user ac... |
|
DanielG |
hashcat
|
3 |
3,216 |
08-01-2018, 05:06 PM |
|
|
Thread: hashcat v4.2.0
Post: RE: hashcat v4.2.0
the links are https://hashcat.net/files/hashcat-4.2.0.7z and https://hashcat.net/files/hashcat-4.2.0.tar.gz |
|
DanielG |
hashcat
|
10 |
27,941 |
08-03-2018, 08:59 AM |
|
|
Thread: Configuration problem
Post: RE: Configuration problem
E3AAD692DB9443A8A694C9DD63DD2F9CF354F27D is not the SHA1 of 'kadi1830'. The SHA1 is 782D8C9077AE7989F7453B29392414C089879EA8. So that's why you are not cracking it.
How did you make this hash?
... |
|
DanielG |
hashcat
|
1 |
1,690 |
08-06-2018, 10:13 AM |
|
|
Thread: cryptomator
Post: RE: cryptomator
Looking at https://cryptomator.org/security/architecture/ it looks like it is scrypt which is supported by hashcat: https://hashcat.net/wiki/doku.php?id=example_hashes
You will need to figure out... |
|
DanielG |
hashcat
|
1 |
1,695 |
08-07-2018, 11:01 AM |
|
|
Thread: PDF Hash
Post: RE: PDF Hash
you are using -m 10400, which on https://hashcat.net/wiki/doku.php?id=example_hashes starts with $pdf$1*
But your hash starts with $pdf$2* which looks like -m 10500 |
|
DanielG |
hashcat
|
9 |
6,364 |
08-08-2018, 11:29 AM |
|
|
Thread: Help me with md5(md5($pass).$pass)
Post: RE: Help me with md5(md5($pass).$pass)
|
DanielG |
hashcat
|
1 |
1,619 |
08-29-2018, 09:09 AM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
You don't want to do this.
Assuming your command will work, length 64 brute force with a-z 0-9 is not going to work. Let's find out why:
Let's assume you have 149,000$ and buy a 8 NVIDIA Tesla... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 02:27 PM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
No problem, for the rest of the technical questions you can try https://hashcat.net/wiki/doku.php?id=mask_attack and https://hashcat.net/wiki/doku.php?id=hashcat for the correct commandline options. I... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 03:40 PM |
|
|
Thread: ITunes Backup encryption
Post: RE: ITunes Backup encryption
If you use the search functionality of the Forum and search for "iTunes" you get a few topics with the same question. One of the tools you will find is https://github.com/philsmd/itunes_backup2hashcat... |
|
DanielG |
hashcat
|
1 |
1,674 |
10-19-2018, 12:21 PM |
|
|
Thread: HashCat just doesn't crack my MD5 hash with brute force
Post: RE: HashCat just doesn't crack my MD5 hash with br...
Your hashes seem to be double MD5, so not just md5("abcd") but md5(md5("abcd")). 5259ee4a034fdeddd1b65be92debe731 is "asdf" for example.
If you look at https://hashcat.net/wiki/doku.php?id=hashcat... |
|
DanielG |
hashcat
|
2 |
5,742 |
10-23-2018, 05:16 PM |