Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Using hashcat (GPU) with simple hash function
Post: RE: Using hashcat (GPU) with simple hash function
Okay, I tried to run this code locally and there is indeed a bug if I take the code you posted literally.
The code
Code:
--
hash += (s[i] * s[i] * s[i] * s[i] * s[i]);
--
does not produce the c... |
|
DanielG |
hashcat
|
4 |
1,951 |
07-10-2019, 09:38 AM |
|
|
Thread: Looking to rent GPU Server 4 hashcat.
Post: RE: Looking to rent GPU Server 4 hashcat.
"hour how much time would i need on 10x 1080... for 8 char ?a or 10 ?a brute"
Let's calculate this:
Hashcat supports these:
-m 11300 = Bitcoin/Litecoin wallet.dat
-m 12700 = Blockchain, My Wal... |
|
DanielG |
Hardware
|
4 |
4,071 |
07-12-2019, 11:10 AM |
|
|
Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $
Cool, nice way you found that out too |
|
DanielG |
General Talk
|
4 |
1,671 |
09-25-2019, 09:17 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities.
These guys at www.onlinehashcrack.c... |
|
DanielG |
hashcat
|
4 |
1,655 |
10-21-2019, 08:51 AM |
|
|
Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing
Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788 |
|
DanielG |
User Contributions
|
4 |
2,758 |
03-04-2020, 10:10 AM |
|
|
Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt
First step is to have a test password that you know so you can test your hypothesis.
Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex... |
|
DanielG |
hashcat
|
4 |
1,105 |
03-19-2020, 04:14 PM |
|
|
Thread: Line-length exception?
Post: RE: Line-length exception?
You are setting -t (--markov-threshold Threshold X when to stop accepting new markov-chains) to 500, you probably want -m 500 (-m, --hash-type) to 500 which is md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5... |
|
DanielG |
General Talk
|
3 |
4,747 |
12-29-2017, 08:40 AM |
|
|
Thread: Just a little issue, hoping for some support
Post: RE: Just a little issue, hoping for some support
Would be nice to know the results of your "reading up and down for over an hour, on diff sites and forums". Because you're bound to get suggestions that you already saw in your hours of research but d... |
|
DanielG |
hashcat
|
3 |
2,824 |
01-02-2018, 12:24 PM |
|
|
Thread: aes128 brute-force w/mask using half sha256
Post: RE: aes128 brute-force w/mask using half sha256
If you only have half a SHA256 hash I think you would need to edit the m01400* files (SHA256) to do something similar as the m05100* files (Half MD5) on https://github.com/hashcat/hashcat/tree/mast... |
|
DanielG |
hashcat
|
3 |
4,106 |
01-09-2018, 03:22 PM |
|
|
Thread: Error while running hashcat: llvm_codegen: Assertion error == 0 failed...
Post: RE: Error while running hashcat: llvm_codegen: As...
Several google results regarding the error llvm_codegen: Assertion 'error == 0' failed indicate that installing 'clang' resolved this.
Quote:
--
sudo apt-get install clang-3.8
--
|
|
DanielG |
hashcat
|
3 |
3,845 |
01-16-2018, 04:07 PM |
|
|
Thread: HELP, need a mask example
Post: RE: HELP, need a mask example
rasoulcarrera Wrote: (01-31-2018, 12:45 PM)
--
nope ,seen it and nothing
--
It literally says on https://hashcat.net/wiki/doku.php?id=mask_attack#example
Built-in charsets
?l = abcdefghijkl... |
|
DanielG |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
4,041 |
01-31-2018, 02:18 PM |
|
|
Thread: cracking password with part of it knowm
Post: RE: cracking password with part of it knowm
Big question is why are you using "--force", maybe it has to do with the error you are suppressing. What is your entire output when not using "--force"? |
|
DanielG |
hashcat
|
3 |
3,764 |
04-09-2018, 08:52 AM |
|
|
Thread: Disable Cracking performance lower than expected?
Post: RE: Disable Cracking performance lower than expect...
yeah, get the source code off github, change the part of the code that does that, compile hashcat, no more message. |
|
DanielG |
hashcat
|
3 |
3,345 |
07-29-2018, 01:13 PM |
|
|
Thread: error v4.1.0
Post: RE: error v4.1.0
Is it also possible that hashcat has been extracted to a folder where an admin has rights but a user does not? So if you unzip hashcat using Admin account but start command prompt using normal user ac... |
|
DanielG |
hashcat
|
3 |
3,216 |
08-01-2018, 05:06 PM |
|
|
Thread: Help identifying this hash
Post: RE: Help identifying this hash
You mention AspNetUsers which lead me to https://msdn.microsoft.com/en-us/magazine/dn818488.aspx. This mentions that next to the passwordhash a SecurityStamp GUID is stored. The part you posted after ... |
|
DanielG |
General Talk
|
3 |
2,852 |
08-20-2018, 08:51 AM |
|
|
Thread: Please, help identifying hash type
Post: RE: Please, help identifying hash type
It would help to tell us where you got the hash from, it saves us searching for it and discovering it is a HP Switch config password. On https://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c04149503-1.... |
|
DanielG |
General Talk
|
3 |
2,806 |
09-06-2018, 09:08 AM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
You don't want to do this.
Assuming your command will work, length 64 brute force with a-z 0-9 is not going to work. Let's find out why:
Let's assume you have 149,000$ and buy a 8 NVIDIA Tesla... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 02:27 PM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
No problem, for the rest of the technical questions you can try https://hashcat.net/wiki/doku.php?id=mask_attack and https://hashcat.net/wiki/doku.php?id=hashcat for the correct commandline options. I... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 03:40 PM |
|
|
Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow
This looks like exactly as the reason why password tools (like Keepass) use the algorithms they use. You should be slow at brute-forcing it, that's the point. I made a Keepass file with 100000 rounds ... |
|
DanielG |
hashcat
|
3 |
2,010 |
10-29-2018, 12:14 PM |
|
|
Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat
https://github.com/hashcat/hashcat/tree/master/OpenCL read, learn, edit, use |
|
DanielG |
hashcat
|
3 |
2,374 |
10-30-2018, 12:52 PM |