Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities.
These guys at www.onlinehashcrack.c... |
|
DanielG |
hashcat
|
4 |
1,655 |
10-21-2019, 08:51 AM |
|
|
Thread: MD5 question
Post: RE: MD5 question
1. know exactly how many times it is hashed (3,4,5,etc)
2. write a custom kernel that can handle the exact amount of md5 rounds |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 10:01 AM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind looks cool, https://www.techsolvency.com/pub/bin/mdxfind/
"Multi-iteration: can try thousands of iteration counts of any of these core algorithms".
On https://www.techsolvency.com/pub/bin/... |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 12:24 PM |
|
|
Thread: Masking question
Post: RE: Masking question
https://hashcat.net/wiki/doku.php?id=mask_attack
Quote:
--
A placeholder can be either a custom charset variable, a built-in charset variable or a static letter
--
so yeah, just a?a?a?a?a?a?a?... |
|
DanielG |
hashcat
|
2 |
1,142 |
11-01-2019, 04:03 PM |
|
|
Thread: Advice for Reviving Old Machine for Hashcat
Post: RE: Advice for Reviving Old Machine for Hashcat
Before buying hardware make sure cracking is feasible. What do you know about the password for the truecrypt container? If you only know it is 20 characters for example you will never crack it. But if... |
|
DanielG |
hashcat
|
5 |
1,621 |
12-12-2019, 10:33 AM |
|
|
Thread: VNC challenge response password crack
Post: RE: VNC challenge response password crack
Wow very cool, according to https://en.wikipedia.org/wiki/Virtual_Network_Computing there are different protocols used by different VNC clients. Which protocol / clients use this particular method of ... |
|
DanielG |
User Contributions
|
2 |
2,609 |
12-18-2019, 04:34 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
I don't get what your goal is here, any domain admin can change the password of the account so that is your best option.
You don't need to crack the NTLM hash for most other 'less-ethical' use cas... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 09:43 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
"My thinking was to crack the old NTLM hash, key it into AD"
I think you can change it back without knowing what the old password was. You can set the old NTLM hash with
lsadump::ChangeNTLM /server:A... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 05:19 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting. |
|
DanielG |
hashcat
|
11 |
8,613 |
01-06-2020, 05:50 PM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
on the official forum there is a topic about bruteforce a forgotten password on https://forums.packetizer.com/viewtopic.php?f=72&t=1333 there is a slow python version using the tool itself but a user ... |
|
DanielG |
General Talk
|
20 |
5,128 |
01-08-2020, 09:56 AM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
okay, googling a bit more it seems the format is pretty open. The fileformat is described on https://www.aescrypt.com/aes_file_format.html and there is source on https://github.com/kenkendk/sharpaescr... |
|
DanielG |
General Talk
|
20 |
5,128 |
01-08-2020, 10:18 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
|
DanielG |
hashcat
|
11 |
8,613 |
01-09-2020, 09:48 AM |
|
|
Thread: Pantagrule, a really large last-resort ruleset
Post: RE: Pantagrule, a really large last-resort ruleset
Cool, thanks for your contribution. I added it to my rules/ folder. Always nice to have different rulesets based on real world data. |
|
DanielG |
User Contributions
|
2 |
1,659 |
01-14-2020, 01:34 PM |
|
|
Thread: Need help to identify encryption
Post: RE: Need help to identify encryption
On a lot of "Default Usernames & Passwords" lists for routers Huawei devices seem to have the password 'admin' or '[email protected]' as the password. Perhaps try that before trying to break the config... |
|
DanielG |
hashcat
|
2 |
1,119 |
02-10-2020, 11:52 AM |
|
|
Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow
Ulfr11 Wrote: (02-27-2020, 04:36 AM)
--
?h is much faster mask than ?a in brute Force attacks
--
Yes, counting to 10 is faster than counting to 100. |
|
DanielG |
hashcat
|
5 |
1,805 |
02-27-2020, 02:48 PM |
|
|
Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing
Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788 |
|
DanielG |
User Contributions
|
4 |
2,758 |
03-04-2020, 10:10 AM |
|
|
Thread: Intercept zip decryption key or files from an application
Post: RE: Intercept zip decryption key or files from an ...
Yes but it heavily depends on the application and how you have access to it. You can decompile the application and look for the password, debug the running application, run a trace on calls that are b... |
|
DanielG |
General Talk
|
1 |
719 |
03-12-2020, 05:33 PM |
|
|
Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt
First step is to have a test password that you know so you can test your hypothesis.
Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex... |
|
DanielG |
hashcat
|
4 |
1,105 |
03-19-2020, 04:14 PM |
|
|
Thread: DECRYPTUM
Post: RE: DECRYPTUM
Very cool, what are you using this beast of a machine for?
Ah I see it's a commercial device on https://www.decryptum.com/ (https://www.decryptum.com/) |
|
DanielG |
Hardware
|
12 |
1,219 |
09-16-2020, 10:07 AM |