Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...
More precisely, this is exactly why these hashes are used for things such as Ethereum Wallets. Because they are sooooo sloooooow. |
|
DanielG |
hashcat
|
8 |
5,504 |
12-11-2018, 10:15 AM |
|
|
Thread: XFX ATI HD 5870 Radeon graphics card 1gb, AMD, PCI-e.
Post: RE: XFX ATI HD 5870 Radeon graphics card 1gb, AMD,...
Also see Atom in https://hashcat.net/forum/thread-6473.html:
atom Wrote: (04-09-2017, 08:54 AM)
--
The GPU is ways too old, the drivers are outdated. [...]
--
|
|
DanielG |
Hardware
|
9 |
6,481 |
03-28-2018, 05:03 PM |
|
|
Thread: PDF Hash
Post: RE: PDF Hash
you are using -m 10400, which on https://hashcat.net/wiki/doku.php?id=example_hashes starts with $pdf$1*
But your hash starts with $pdf$2* which looks like -m 10500 |
|
DanielG |
hashcat
|
9 |
6,364 |
08-08-2018, 11:29 AM |
|
|
Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?
It does show the found password immediately when found:
https://i.imgur.com/1kyMkTN.png |
|
DanielG |
hashcat
|
9 |
3,253 |
09-05-2019, 12:25 PM |
|
|
Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password
qpens8 Wrote: (02-08-2018, 03:36 AM)
--
Is hashcat storing my pass somewhere?
--
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_potfile |
|
DanielG |
hashcat
|
10 |
7,999 |
02-08-2018, 10:18 AM |
|
|
Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password
Maybe the password is blank (my hashcat finds the same empty password for your posted hash). No password on the PDF file, at least not found by the program making the hash? |
|
DanielG |
hashcat
|
10 |
7,999 |
02-08-2018, 04:25 PM |
|
|
Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax
If your hash (12345678...) is not 32 characters long, then you can get that error. Because that means it is probably not MD5. See https://hashcat.net/wiki/doku.php?id=example_hashes for examples of ho... |
|
DanielG |
hashcat
|
10 |
6,735 |
03-29-2018, 03:47 PM |
|
|
Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax
Okay that is weird, if I make a file hash.txt with d8e8fca2dc0f896fd7cb4cb0031ba249:abcdefghj I get:
./hashcat -m 10 -a 0 hash.txt wordlist.txt
[...]
Hash 'hash.txt': Line-length exception
No ha... |
|
DanielG |
hashcat
|
10 |
6,735 |
03-29-2018, 03:58 PM |
|
|
Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax
$ ls h*
hashcat hashcat.hctune hashcat.potfile
hashcat.dictstat hashcat.log hashcat.potfile.old
hashcat.hcstat hashcat.pot hahs.txt
Oh wow just as philsmd says, make sure you don't make ty... |
|
DanielG |
hashcat
|
10 |
6,735 |
03-29-2018, 04:10 PM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Oh wow, why would they make that choice, using just DES and key "61d0e54954733b80" decodes it indeed (https://gchq.github.io/CyberChef/#recipe=DES_Decrypt(%7B'option':'Hex','string':'61d0e54954733b80'... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 10:37 AM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
If they store the passwords locally they seem to use "the strongly secure SHA format"
https://manuals.gfi.com/en/kerio/connect/content/assets/add_user.png
https://manuals.gfi.com/en/kerio/connect/... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-12-2018, 01:05 PM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Awesome debugging powers to get that info! Seems to be 3DES indeed with key "61d0e54954733b8080808080808080808080808080808080".
Decoding D3S:8742ddf7db1906c5d54ec948c500e587adfa4447eff8dc42adfa4447... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 09:36 AM |
|
|
Thread: hashcat v4.2.0
Post: RE: hashcat v4.2.0
the links are https://hashcat.net/files/hashcat-4.2.0.7z and https://hashcat.net/files/hashcat-4.2.0.tar.gz |
|
DanielG |
hashcat
|
10 |
27,941 |
08-03-2018, 08:59 AM |
|
|
Thread: Status: Exhausted Bitcoin Wallet Passphrase Recovery
Post: RE: Status: Exhausted Bitcoin Wallet Passphrase Re...
you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none... |
|
DanielG |
hashcat
|
10 |
5,905 |
02-13-2019, 04:40 PM |
|
|
Thread: Status: Exhausted Bitcoin Wallet Passphrase Recovery
Post: RE: Status: Exhausted Bitcoin Wallet Passphrase Re...
suhel1986 Wrote: (02-14-2019, 12:07 AM)
--
Sorry mate I am not so good at this one, now I got following error,
I guessed if the password was 10 to 15 char long I used following command and I got ... |
|
DanielG |
hashcat
|
10 |
5,905 |
02-14-2019, 10:34 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Hi, you would probably already be cracking if you followed the information on the wiki (https://hashcat.net/wiki/). Here you can follow the steps needed to crack your hash:
https://hashcat.net/wiki/d... |
|
DanielG |
hashcat
|
11 |
12,044 |
01-09-2018, 05:31 PM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
?1 is indeed how you access the custom charset mentioned. In the example I put 12 "?1" combinations because that is your max length for your password. This makes it easy if you decide to try somethi... |
|
DanielG |
hashcat
|
11 |
12,044 |
01-11-2018, 10:31 AM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
I think you could do 2 things:
- the best one is https://hashcat.net/wiki/doku.php?id=hybrid_attack where you make a wordlist with all the variants of PASSWOR (such as Passwor, PAsswor, PaSswor, etc)... |
|
DanielG |
General Talk
|
11 |
5,710 |
08-27-2019, 08:38 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
"My thinking was to crack the old NTLM hash, key it into AD"
I think you can change it back without knowing what the old password was. You can set the old NTLM hash with
lsadump::ChangeNTLM /server:A... |
|
DanielG |
hashcat
|
11 |
8,625 |
01-03-2020, 05:19 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting. |
|
DanielG |
hashcat
|
11 |
8,625 |
01-06-2020, 05:50 PM |