Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: OpenCl kernel self-test failed when using any version later than v4.2.1 !!
Post: RE: OpenCl kernel self-test failed when using any ...
https://66.media.tumblr.com/c560849f3c57fc6ed3c0ef57cff43277/tumblr_inline_nkirl9V7Sg1s9de7o.jpg |
|
DanielG |
hashcat
|
29 |
21,222 |
02-06-2019, 10:38 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
Yeah what philsmd said.
The wrong login response was just the assumption you intercepted a random person logging in to the system. However the Arabic text after the login attempt says that the log... |
|
DanielG |
General Talk
|
27 |
14,953 |
02-21-2019, 11:42 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
On https://miloserdov.org/?p=1088 it says the hash 15b4c47a3e0e44b9e40db20ac1225023 is for hexMD5('\301' + "22222222" + '\237\174\357\335\234\211\367\356\273\105\215\277\226\361\103\120') on the scr... |
|
DanielG |
General Talk
|
27 |
14,953 |
02-19-2019, 02:04 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
I think this is going past what hashcat is about and more turning in how you can hack a certain piece of software.
You have all the information in this topic (and external sources) to understand inter... |
|
DanielG |
General Talk
|
27 |
14,953 |
02-22-2019, 10:23 AM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
on the official forum there is a topic about bruteforce a forgotten password on https://forums.packetizer.com/viewtopic.php?f=72&t=1333 there is a slow python version using the tool itself but a user ... |
|
DanielG |
General Talk
|
20 |
5,128 |
01-08-2020, 09:56 AM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
okay, googling a bit more it seems the format is pretty open. The fileformat is described on https://www.aescrypt.com/aes_file_format.html and there is source on https://github.com/kenkendk/sharpaescr... |
|
DanielG |
General Talk
|
20 |
5,128 |
01-08-2020, 10:18 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
You can also just use the "Avatar URL" functionality and use your URL https://a.pomf.cat/dbrbzz.jpg or any other image service host. |
|
DanielG |
hashcat
|
18 |
12,096 |
04-16-2018, 09:33 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Make your avatar a PNG file (not jpg), since you are only using 2 colours and simple design it will make it a very small file. If it is below 10K just upload it here, otherwise:
Upload your avatar ... |
|
DanielG |
hashcat
|
18 |
12,096 |
04-16-2018, 11:35 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Yeah, maybe Atom (https://hashcat.net/forum/user-1.html) disabled this feature recently. |
|
DanielG |
hashcat
|
18 |
12,096 |
04-17-2018, 10:34 AM |
|
|
Thread: Estimate Time Is Super Slow
Post: RE: Estimate Time Is Super Slow
It is always advised to not use a VM (Virtualbox or otherwise) for hashcat, and not use The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) because of drivers.
Also, using a laptop GPU to much... |
|
DanielG |
hashcat
|
18 |
8,555 |
01-15-2019, 05:19 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
ajaxdecbe Wrote:
--
What is the advantage of using m 20 instead of m 0?
--
I also read in another post (trying to find it at the moment) that -m 20 has some optimisations making it slightly faster ... |
|
DanielG |
hashcat
|
16 |
9,677 |
04-25-2018, 10:48 AM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like. |
|
DanielG |
hashcat
|
14 |
19,727 |
06-28-2018, 04:08 PM |
|
|
Thread: how to crack a windows 10 local user password hash(Netnlm capture)
Post: RE: how to crack a windows 10 local user password ...
"it is in that loop should I let do its thing?"
Yeah you should also see that it took 1 hour to do 5 positions, and it wil take several days to do the next 100% |
|
DanielG |
hashcat
|
14 |
4,710 |
08-16-2019, 03:53 PM |
|
|
Thread: Incorrect results
Post: RE: Incorrect results
I only once had this occur when trying to crack an 'empty' hash.
So for NTLM this is 31d6cfe0d16ae931b73c59d7e0c089c0, just checking in the unlikely case your hash is also 31d6cfe0d16ae931b73c59d7e0c... |
|
DanielG |
hashcat
|
13 |
7,062 |
11-28-2018, 10:36 PM |
|
|
Thread: Not finding my own set password
Post: RE: Not finding my own set password
LoZio Wrote: (12-14-2018, 04:17 PM)
--
Using 5.10 on Win as:
hashcat64.exe -a 3 -m 9600 \Work\test.hsh \Work\test.txt
or
hashcat64.exe -a 0 -m 9600 \Work\test.hsh passpas?l
I think I'... |
|
DanielG |
hashcat
|
12 |
6,008 |
12-14-2018, 04:51 PM |
|
|
Thread: Not finding my own set password
Post: RE: Not finding my own set password
okay, so you typed them instead of copy/paste from your commandline, are you sure you aren't forgetting something else? like perhaps you are using --force? or other options? And hashcat does not show ... |
|
DanielG |
hashcat
|
12 |
6,008 |
12-14-2018, 05:10 PM |
|
|
Thread: DECRYPTUM
Post: RE: DECRYPTUM
Very cool, what are you using this beast of a machine for?
Ah I see it's a commercial device on https://www.decryptum.com/ (https://www.decryptum.com/) |
|
DanielG |
Hardware
|
12 |
1,219 |
09-16-2020, 10:07 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Hi, you would probably already be cracking if you followed the information on the wiki (https://hashcat.net/wiki/). Here you can follow the steps needed to crack your hash:
https://hashcat.net/wiki/d... |
|
DanielG |
hashcat
|
11 |
12,044 |
01-09-2018, 05:31 PM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
?1 is indeed how you access the custom charset mentioned. In the example I put 12 "?1" combinations because that is your max length for your password. This makes it easy if you decide to try somethi... |
|
DanielG |
hashcat
|
11 |
12,044 |
01-11-2018, 10:31 AM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
I think you could do 2 things:
- the best one is https://hashcat.net/wiki/doku.php?id=hybrid_attack where you make a wordlist with all the variants of PASSWOR (such as Passwor, PAsswor, PaSswor, etc)... |
|
DanielG |
General Talk
|
11 |
5,707 |
08-27-2019, 08:38 AM |