Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
I don't get what your goal is here, any domain admin can change the password of the account so that is your best option.
You don't need to crack the NTLM hash for most other 'less-ethical' use cas... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 09:43 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
"My thinking was to crack the old NTLM hash, key it into AD"
I think you can change it back without knowing what the old password was. You can set the old NTLM hash with
lsadump::ChangeNTLM /server:A... |
|
DanielG |
hashcat
|
11 |
8,613 |
01-03-2020, 05:19 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting. |
|
DanielG |
hashcat
|
11 |
8,613 |
01-06-2020, 05:50 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
|
DanielG |
hashcat
|
11 |
8,613 |
01-09-2020, 09:48 AM |
|
|
Thread: Crack this hash, win 2 Bitcoins!
Post: RE: Crack this hash, win 2 Bitcoins!
jackisme123 Wrote: (03-21-2018, 02:10 PM)
--
My password is not very long, less than 8 digits I believe.
--
1-7 digits = 11111110 possibilities, 400 hashes per second = 7,7 hours.
You want to pay... |
|
DanielG |
hashcat
|
2 |
2,806 |
03-21-2018, 02:25 PM |
|
|
Thread: cracking password with part of it knowm
Post: RE: cracking password with part of it knowm
Big question is why are you using "--force", maybe it has to do with the error you are suppressing. What is your entire output when not using "--force"? |
|
DanielG |
hashcat
|
3 |
3,764 |
04-09-2018, 08:52 AM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like. |
|
DanielG |
hashcat
|
14 |
19,727 |
06-28-2018, 04:08 PM |
|
|
Thread: cryptomator
Post: RE: cryptomator
Looking at https://cryptomator.org/security/architecture/ it looks like it is scrypt which is supported by hashcat: https://hashcat.net/wiki/doku.php?id=example_hashes
You will need to figure out... |
|
DanielG |
hashcat
|
1 |
1,695 |
08-07-2018, 11:01 AM |
|
|
Thread: DECRYPTUM
Post: RE: DECRYPTUM
Very cool, what are you using this beast of a machine for?
Ah I see it's a commercial device on https://www.decryptum.com/ (https://www.decryptum.com/) |
|
DanielG |
Hardware
|
12 |
1,219 |
09-16-2020, 10:07 AM |
|
|
Thread: Dictionary for long passwords - Tips and ideas
Post: RE: Dictionary for long passwords - Tips and ideas
eriden Wrote: (08-03-2018, 12:10 PM)
--
My initial thought was that people using passwords of 16+ characters in length would mostly use pass phrases (I.e. "I love my two dogs!"). So perhaps combinin... |
|
DanielG |
General Talk
|
7 |
6,427 |
08-03-2018, 12:33 PM |
|
|
Thread: Dictionary for long passwords - Tips and ideas
Post: RE: Dictionary for long passwords - Tips and ideas
Unfortunately Cambridge University didn't post it (anywhere I could find), but researchers are nice people so you could try contacting the people in the paper.
You could look at https://github.com/... |
|
DanielG |
General Talk
|
7 |
6,427 |
08-08-2018, 10:36 AM |
|
|
Thread: Disable Cracking performance lower than expected?
Post: RE: Disable Cracking performance lower than expect...
yeah, get the source code off github, change the part of the code that does that, compile hashcat, no more message. |
|
DanielG |
hashcat
|
3 |
3,345 |
07-29-2018, 01:13 PM |
|
|
Thread: Easy password with runic
Post: RE: Easy password with runic
Hashcat can bruteforce any input bytes, so theoretically yes. |
|
DanielG |
hashcat
|
6 |
3,550 |
07-27-2018, 09:58 AM |
|
|
Thread: Easy password with runic
Post: RE: Easy password with runic
The brute-force attack mode (https://hashcat.net/wiki/doku.php?id=mask_attack) allows the use of ?b which are all the bytes 0x00 through 0xff. So that would be a way, although probably very ineffici... |
|
DanielG |
hashcat
|
6 |
3,550 |
07-27-2018, 10:19 AM |
|
|
Thread: error v4.1.0
Post: RE: error v4.1.0
Is it also possible that hashcat has been extracted to a folder where an admin has rights but a user does not? So if you unzip hashcat using Admin account but start command prompt using normal user ac... |
|
DanielG |
hashcat
|
3 |
3,216 |
08-01-2018, 05:06 PM |
|
|
Thread: Error while running hashcat: llvm_codegen: Assertion error == 0 failed...
Post: RE: Error while running hashcat: llvm_codegen: As...
Several google results regarding the error llvm_codegen: Assertion 'error == 0' failed indicate that installing 'clang' resolved this.
Quote:
--
sudo apt-get install clang-3.8
--
|
|
DanielG |
hashcat
|
3 |
3,845 |
01-16-2018, 04:07 PM |
|
|
Thread: Estimate Time Is Super Slow
Post: RE: Estimate Time Is Super Slow
It is always advised to not use a VM (Virtualbox or otherwise) for hashcat, and not use The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) because of drivers.
Also, using a laptop GPU to much... |
|
DanielG |
hashcat
|
18 |
8,556 |
01-15-2019, 05:19 PM |
|
|
Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...
More precisely, this is exactly why these hashes are used for things such as Ethereum Wallets. Because they are sooooo sloooooow. |
|
DanielG |
hashcat
|
8 |
5,504 |
12-11-2018, 10:15 AM |
|
|
Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?
It does show the found password immediately when found:
https://i.imgur.com/1kyMkTN.png |
|
DanielG |
hashcat
|
9 |
3,253 |
09-05-2019, 12:25 PM |
|
|
Thread: GTX 1080 Bitcoin Core Performance
Post: RE: GTX 1080 Bitcoin Core Performance
10 length only numbers and letters (uppercase and lowercase) = 10^62 / 4508 per second = 7 × 10^50 years
10 length only numbers and letters (uppercase or lowercase) = 10^36 / 4508 per second =... |
|
DanielG |
General Talk
|
6 |
5,114 |
01-02-2018, 02:21 PM |