Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?
It does show the found password immediately when found:
https://i.imgur.com/1kyMkTN.png |
|
DanielG |
hashcat
|
9 |
3,253 |
09-05-2019, 12:25 PM |
|
|
Thread: problems with —show
Post: RE: problems with —show
"until the process is finished", well after it finishes it shows some statistics you need to read:
Code:
--
Status...........: Exhausted
Hash.Type........: MD5
Hash.Target......: 0000000000000000000... |
|
DanielG |
hashcat
|
1 |
981 |
09-09-2019, 03:59 PM |
|
|
Thread: Token length exception
Post: RE: Token length exception
extracting hash from MS Excel file can be done by reading this part of the wiki: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_office_word_excel_etc_... |
|
DanielG |
hashcat
|
1 |
1,113 |
09-17-2019, 04:11 PM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities.
These guys at www.onlinehashcrack.c... |
|
DanielG |
hashcat
|
4 |
1,655 |
10-21-2019, 08:51 AM |
|
|
Thread: MD5 question
Post: RE: MD5 question
1. know exactly how many times it is hashed (3,4,5,etc)
2. write a custom kernel that can handle the exact amount of md5 rounds |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 10:01 AM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind looks cool, https://www.techsolvency.com/pub/bin/mdxfind/
"Multi-iteration: can try thousands of iteration counts of any of these core algorithms".
On https://www.techsolvency.com/pub/bin/... |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 12:24 PM |
|
|
Thread: Masking question
Post: RE: Masking question
https://hashcat.net/wiki/doku.php?id=mask_attack
Quote:
--
A placeholder can be either a custom charset variable, a built-in charset variable or a static letter
--
so yeah, just a?a?a?a?a?a?a?... |
|
DanielG |
hashcat
|
2 |
1,142 |
11-01-2019, 04:03 PM |
|
|
Thread: Advice for Reviving Old Machine for Hashcat
Post: RE: Advice for Reviving Old Machine for Hashcat
Before buying hardware make sure cracking is feasible. What do you know about the password for the truecrypt container? If you only know it is 20 characters for example you will never crack it. But if... |
|
DanielG |
hashcat
|
5 |
1,621 |
12-12-2019, 10:33 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
"My thinking was to crack the old NTLM hash, key it into AD"
I think you can change it back without knowing what the old password was. You can set the old NTLM hash with
lsadump::ChangeNTLM /server:A... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 05:19 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
I don't get what your goal is here, any domain admin can change the password of the account so that is your best option.
You don't need to crack the NTLM hash for most other 'less-ethical' use cas... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 09:43 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting. |
|
DanielG |
hashcat
|
11 |
8,613 |
01-06-2020, 05:50 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
|
DanielG |
hashcat
|
11 |
8,613 |
01-09-2020, 09:48 AM |
|
|
Thread: Need help to identify encryption
Post: RE: Need help to identify encryption
On a lot of "Default Usernames & Passwords" lists for routers Huawei devices seem to have the password 'admin' or '[email protected]' as the password. Perhaps try that before trying to break the config... |
|
DanielG |
hashcat
|
2 |
1,119 |
02-10-2020, 11:52 AM |
|
|
Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow
Ulfr11 Wrote: (02-27-2020, 04:36 AM)
--
?h is much faster mask than ?a in brute Force attacks
--
Yes, counting to 10 is faster than counting to 100. |
|
DanielG |
hashcat
|
5 |
1,805 |
02-27-2020, 02:48 PM |
|
|
Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt
First step is to have a test password that you know so you can test your hypothesis.
Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex... |
|
DanielG |
hashcat
|
4 |
1,105 |
03-19-2020, 04:14 PM |
|
|
Thread: HELP, need a mask example
Post: RE: HELP, need a mask example
rasoulcarrera Wrote: (01-31-2018, 12:45 PM)
--
nope ,seen it and nothing
--
It literally says on https://hashcat.net/wiki/doku.php?id=mask_attack#example
Built-in charsets
?l = abcdefghijkl... |
|
DanielG |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
4,041 |
01-31-2018, 02:18 PM |
|
|
Thread: VNC challenge response password crack
Post: RE: VNC challenge response password crack
Wow very cool, according to https://en.wikipedia.org/wiki/Virtual_Network_Computing there are different protocols used by different VNC clients. Which protocol / clients use this particular method of ... |
|
DanielG |
User Contributions
|
2 |
2,609 |
12-18-2019, 04:34 PM |
|
|
Thread: Pantagrule, a really large last-resort ruleset
Post: RE: Pantagrule, a really large last-resort ruleset
Cool, thanks for your contribution. I added it to my rules/ folder. Always nice to have different rulesets based on real world data. |
|
DanielG |
User Contributions
|
2 |
1,659 |
01-14-2020, 01:34 PM |
|
|
Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing
Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788 |
|
DanielG |
User Contributions
|
4 |
2,758 |
03-04-2020, 10:10 AM |