Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Can external code used as a custom hash for hashcat?
Post: RE: Can external code used as a custom hash for ha...
You can code a new kernel, with functions seen here: https://github.com/hashcat/hashcat/tree/master/OpenCL for example https://github.com/hashcat/hashcat/blob/master/OpenCL/m11300-pure.cl is for the ... |
|
DanielG |
hashcat
|
1 |
2,031 |
12-23-2018, 08:24 PM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
You don't want to do this.
Assuming your command will work, length 64 brute force with a-z 0-9 is not going to work. Let's find out why:
Let's assume you have 149,000$ and buy a 8 NVIDIA Tesla... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 02:27 PM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
No problem, for the rest of the technical questions you can try https://hashcat.net/wiki/doku.php?id=mask_attack and https://hashcat.net/wiki/doku.php?id=hashcat for the correct commandline options. I... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 03:40 PM |
|
|
Thread: 2080ti $Bitcoin$ hashrate
Post: RE: 2080ti $Bitcoin$ hashrate
Kulahin Wrote: (10-14-2018, 02:34 PM)
--
What do you think about this hashrate
--
It is a good hashrate for your card, which you did not mention. Lol I'm blind, it's in the title. |
|
DanielG |
Hardware
|
5 |
4,357 |
10-15-2018, 08:06 AM |
|
|
Thread: ITunes Backup encryption
Post: RE: ITunes Backup encryption
If you use the search functionality of the Forum and search for "iTunes" you get a few topics with the same question. One of the tools you will find is https://github.com/philsmd/itunes_backup2hashcat... |
|
DanielG |
hashcat
|
1 |
1,674 |
10-19-2018, 12:21 PM |
|
|
Thread: HashCat just doesn't crack my MD5 hash with brute force
Post: RE: HashCat just doesn't crack my MD5 hash with br...
Your hashes seem to be double MD5, so not just md5("abcd") but md5(md5("abcd")). 5259ee4a034fdeddd1b65be92debe731 is "asdf" for example.
If you look at https://hashcat.net/wiki/doku.php?id=hashcat... |
|
DanielG |
hashcat
|
2 |
5,742 |
10-23-2018, 05:16 PM |
|
|
Thread: 7000h/s (not 7000kh/s) on GTX 860m
Post: RE: 7000h/s (not 7000kh/s) on GTX 860m
johnbadcracker Wrote: (10-25-2018, 12:18 PM)
--
* Device #2: Not a native Intel OpenCL runtime. Expect massive speed loss.
You can use --force to override, but do not report... |
|
DanielG |
hashcat
|
7 |
4,333 |
10-25-2018, 01:36 PM |
|
|
Thread: 7000h/s (not 7000kh/s) on GTX 860m
Post: RE: 7000h/s (not 7000kh/s) on GTX 860m
I think this part of the FAQ may be related, but make sure to read everything: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#i_may_have_the_wrong_driver_installed_what_should_i_do
... |
|
DanielG |
hashcat
|
7 |
4,333 |
10-25-2018, 02:00 PM |
|
|
Thread: Attack 10 char password known to start with 3 digits
Post: RE: Attack 10 char password known to start with 3 ...
you were very close, you don't need to define the -1.
Code:
--
-2 ?l?u?d ?d?d?d?2?2?2?2?2?2?2
--
|
|
DanielG |
hashcat
|
1 |
1,435 |
10-26-2018, 02:26 PM |
|
|
Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow
This looks like exactly as the reason why password tools (like Keepass) use the algorithms they use. You should be slow at brute-forcing it, that's the point. I made a Keepass file with 100000 rounds ... |
|
DanielG |
hashcat
|
3 |
2,010 |
10-29-2018, 12:14 PM |
|
|
Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat
https://github.com/hashcat/hashcat/tree/master/OpenCL read, learn, edit, use |
|
DanielG |
hashcat
|
3 |
2,374 |
10-30-2018, 12:52 PM |
|
|
Thread: hashcat recovers null results
Post: RE: hashcat recovers null results
Just to be really really sure, if you do sha512($salt) on for example https://passwordsgenerator.net/sha512-hash-generator/ you don't get the hash in your output? |
|
DanielG |
General Talk
|
5 |
3,251 |
11-05-2018, 05:25 PM |
|
|
Thread: hashcat recovers null results
Post: RE: hashcat recovers null results
That hashcat is correctly showing the results. There is no password for those hashes you have, only a salt. Depending on your source this might be logical. |
|
DanielG |
General Talk
|
5 |
3,251 |
11-05-2018, 05:52 PM |
|
|
Thread: Help me identify encription type
Post: RE: Help me identify encription type
Could you provide the 3 numbers? Also a bit more context?
BTW, this question is not really hashcat support related, more like 'hashcat Forum › Misc › General Talk' or even https://www.reddit.co... |
|
DanielG |
hashcat
|
3 |
2,335 |
11-09-2018, 04:57 PM |
|
|
Thread: word combinations with masks between
Post: RE: word combinations with masks between
I think the easiest way is to generate a wordlist on your own with the 2 passwords and every character or two between them (if you can't program, try making it in excel with the standard tables). Then... |
|
DanielG |
General Talk
|
2 |
2,116 |
11-14-2018, 04:32 PM |
|
|
Thread: hashcat-4.1.0 can't run
Post: RE: hashcat-4.1.0 can't run
This is not a lot of info. Is it windows? linux? mac? what is your command you are running? can you see that file in your file browser?
My guess: You installed hashcat (extracted the zip) with user... |
|
DanielG |
hashcat
|
7 |
6,125 |
11-15-2018, 10:17 AM |
|
|
Thread: hashcat 5.0.0 with Token length exception with sha1
Post: RE: hashcat 5.0.0 with Token length exception with...
You are not using --username which tells hashcat to ignore the "foo:" part. Hashcat expects a list with just the hashes, no extra data before that. See https://hashcat.net/wiki/doku.php?id=example_has... |
|
DanielG |
hashcat
|
3 |
8,194 |
11-19-2018, 03:26 PM |
|
|
Thread: About Winzip (13600) hash
Post: RE: About Winzip (13600) hash
Code:
--
filename:$zip2$*Ty*Mo*Ma*Sa*Va*Le*DF*Au*$/zip2$
Ty = type (0) and ignored.
Mo = mode (1 2 3 for 128/192/256 bit)
Ma = magic (file magic). This is reservered for now. See pkzip_fmt_p... |
|
DanielG |
General Talk
|
2 |
3,417 |
11-21-2018, 10:59 AM |
|
|
Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...
Try to find resources like https://hashcat.net/wiki/doku.php?id=hashcat and https://resources.infosecinstitute.com/hashcat-tutorial-beginners/ where you can learn how to use various types of software. |
|
DanielG |
hashcat
|
7 |
4,634 |
11-22-2018, 01:48 PM |
|
|
Thread: Incorrect results
Post: RE: Incorrect results
I only once had this occur when trying to crack an 'empty' hash.
So for NTLM this is 31d6cfe0d16ae931b73c59d7e0c089c0, just checking in the unlikely case your hash is also 31d6cfe0d16ae931b73c59d7e0c... |
|
DanielG |
hashcat
|
13 |
7,062 |
11-28-2018, 10:36 PM |