Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Been away for a while
Post: RE: Been away for a while
|
DanielG |
hashcat
|
4 |
3,509 |
06-12-2018, 05:13 PM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Awesome debugging powers to get that info! Seems to be 3DES indeed with key "61d0e54954733b8080808080808080808080808080808080".
Decoding D3S:8742ddf7db1906c5d54ec948c500e587adfa4447eff8dc42adfa4447... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 09:36 AM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Oh wow, why would they make that choice, using just DES and key "61d0e54954733b80" decodes it indeed (https://gchq.github.io/CyberChef/#recipe=DES_Decrypt(%7B'option':'Hex','string':'61d0e54954733b80'... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 10:37 AM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like. |
|
DanielG |
hashcat
|
14 |
19,727 |
06-28-2018, 04:08 PM |
|
|
Thread: SHA-256 Base-64 (?)
Post: RE: SHA-256 Base-64 (?)
You can just attack it as any other hash? I think you will need to be more specific on what isn't clear.
For example, to attack sha-256 you need mode 1400 (https://hashcat.net/wiki/doku.php?id=exam... |
|
DanielG |
hashcat
|
1 |
2,416 |
07-03-2018, 09:17 AM |
|
|
Thread: where to buy a vps for hashcat?
Post: RE: where to buy a vps for hashcat?
Google cloud: https://hashcat.net/forum/thread-7439.html
AWS EC2: https://hashcat.net/forum/thread-4143.html
there are a few topics in the forum, you can use search to find more |
|
DanielG |
Hardware
|
1 |
2,773 |
07-05-2018, 09:12 AM |
|
|
Thread: Hashcat wont start cracking [noob]
Post: RE: Hashcat wont start cracking [noob]
cesalbaral Wrote: (07-24-2018, 01:51 PM)
--
Be more specific. Did the program not start? You need to run the program by starting it on terminal/cmd not by clicking on it's icon. If the cracking didn... |
|
DanielG |
hashcat
|
8 |
7,990 |
07-24-2018, 02:16 PM |
|
|
Thread: Easy password with runic
Post: RE: Easy password with runic
Hashcat can bruteforce any input bytes, so theoretically yes. |
|
DanielG |
hashcat
|
6 |
3,550 |
07-27-2018, 09:58 AM |
|
|
Thread: Easy password with runic
Post: RE: Easy password with runic
The brute-force attack mode (https://hashcat.net/wiki/doku.php?id=mask_attack) allows the use of ?b which are all the bytes 0x00 through 0xff. So that would be a way, although probably very ineffici... |
|
DanielG |
hashcat
|
6 |
3,550 |
07-27-2018, 10:19 AM |
|
|
Thread: Disable Cracking performance lower than expected?
Post: RE: Disable Cracking performance lower than expect...
yeah, get the source code off github, change the part of the code that does that, compile hashcat, no more message. |
|
DanielG |
hashcat
|
3 |
3,345 |
07-29-2018, 01:13 PM |
|
|
Thread: error v4.1.0
Post: RE: error v4.1.0
Is it also possible that hashcat has been extracted to a folder where an admin has rights but a user does not? So if you unzip hashcat using Admin account but start command prompt using normal user ac... |
|
DanielG |
hashcat
|
3 |
3,216 |
08-01-2018, 05:06 PM |
|
|
Thread: hashcat v4.2.0
Post: RE: hashcat v4.2.0
the links are https://hashcat.net/files/hashcat-4.2.0.7z and https://hashcat.net/files/hashcat-4.2.0.tar.gz |
|
DanielG |
hashcat
|
10 |
27,941 |
08-03-2018, 08:59 AM |
|
|
Thread: Dictionary for long passwords - Tips and ideas
Post: RE: Dictionary for long passwords - Tips and ideas
eriden Wrote: (08-03-2018, 12:10 PM)
--
My initial thought was that people using passwords of 16+ characters in length would mostly use pass phrases (I.e. "I love my two dogs!"). So perhaps combinin... |
|
DanielG |
General Talk
|
7 |
6,427 |
08-03-2018, 12:33 PM |
|
|
Thread: Configuration problem
Post: RE: Configuration problem
E3AAD692DB9443A8A694C9DD63DD2F9CF354F27D is not the SHA1 of 'kadi1830'. The SHA1 is 782D8C9077AE7989F7453B29392414C089879EA8. So that's why you are not cracking it.
How did you make this hash?
... |
|
DanielG |
hashcat
|
1 |
1,690 |
08-06-2018, 10:13 AM |
|
|
Thread: cryptomator
Post: RE: cryptomator
Looking at https://cryptomator.org/security/architecture/ it looks like it is scrypt which is supported by hashcat: https://hashcat.net/wiki/doku.php?id=example_hashes
You will need to figure out... |
|
DanielG |
hashcat
|
1 |
1,695 |
08-07-2018, 11:01 AM |
|
|
Thread: Dictionary for long passwords - Tips and ideas
Post: RE: Dictionary for long passwords - Tips and ideas
Unfortunately Cambridge University didn't post it (anywhere I could find), but researchers are nice people so you could try contacting the people in the paper.
You could look at https://github.com/... |
|
DanielG |
General Talk
|
7 |
6,427 |
08-08-2018, 10:36 AM |
|
|
Thread: PDF Hash
Post: RE: PDF Hash
you are using -m 10400, which on https://hashcat.net/wiki/doku.php?id=example_hashes starts with $pdf$1*
But your hash starts with $pdf$2* which looks like -m 10500 |
|
DanielG |
hashcat
|
9 |
6,364 |
08-08-2018, 11:29 AM |
|
|
Thread: Help identifying this hash
Post: RE: Help identifying this hash
You mention AspNetUsers which lead me to https://msdn.microsoft.com/en-us/magazine/dn818488.aspx. This mentions that next to the passwordhash a SecurityStamp GUID is stored. The part you posted after ... |
|
DanielG |
General Talk
|
3 |
2,852 |
08-20-2018, 08:51 AM |
|
|
Thread: Help me with md5(md5($pass).$pass)
Post: RE: Help me with md5(md5($pass).$pass)
|
DanielG |
hashcat
|
1 |
1,619 |
08-29-2018, 09:09 AM |
|
|
Thread: Please, help identifying hash type
Post: RE: Please, help identifying hash type
It would help to tell us where you got the hash from, it saves us searching for it and discovering it is a HP Switch config password. On https://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c04149503-1.... |
|
DanielG |
General Talk
|
3 |
2,806 |
09-06-2018, 09:08 AM |