Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: [sha256] Hash inside a hash
Post: RE: [sha256] Hash inside a hash
There are 2^256 possible SHA256 hashes, this is about 10^77 possibilities. There are about 10^80 atoms in the whole observable universe. You will need more than "haha like 1tera?", it's more like "hah... |
|
DanielG |
hashcat
|
5 |
3,758 |
11-29-2017, 04:09 PM |
|
|
Thread: XFX ATI HD 5870 Radeon graphics card 1gb, AMD, PCI-e.
Post: RE: XFX ATI HD 5870 Radeon graphics card 1gb, AMD,...
Also see Atom in https://hashcat.net/forum/thread-6473.html:
atom Wrote: (04-09-2017, 08:54 AM)
--
The GPU is ways too old, the drivers are outdated. [...]
--
|
|
DanielG |
Hardware
|
9 |
6,481 |
03-28-2018, 05:03 PM |
|
|
Thread: word combinations with masks between
Post: RE: word combinations with masks between
I think the easiest way is to generate a wordlist on your own with the 2 passwords and every character or two between them (if you can't program, try making it in excel with the standard tables). Then... |
|
DanielG |
General Talk
|
2 |
2,116 |
11-14-2018, 04:32 PM |
|
|
Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow
Ulfr11 Wrote: (02-27-2020, 04:36 AM)
--
?h is much faster mask than ?a in brute Force attacks
--
Yes, counting to 10 is faster than counting to 100. |
|
DanielG |
hashcat
|
5 |
1,805 |
02-27-2020, 02:48 PM |
|
|
Thread: Which Hash modes should be chosen by NThash ciphertext?
Post: RE: Which Hash modes should be chosen by NThash ci...
Yes -m 1000 is for NTLM, see https://hashcat.net/wiki/doku.php?id=example_hashes for example hashes to check if your hash is in the correct format. |
|
DanielG |
hashcat
|
2 |
2,312 |
02-01-2018, 11:58 AM |
|
|
Thread: where to buy a vps for hashcat?
Post: RE: where to buy a vps for hashcat?
Google cloud: https://hashcat.net/forum/thread-7439.html
AWS EC2: https://hashcat.net/forum/thread-4143.html
there are a few topics in the forum, you can use search to find more |
|
DanielG |
Hardware
|
1 |
2,773 |
07-05-2018, 09:12 AM |
|
|
Thread: VNC challenge response password crack
Post: RE: VNC challenge response password crack
Wow very cool, according to https://en.wikipedia.org/wiki/Virtual_Network_Computing there are different protocols used by different VNC clients. Which protocol / clients use this particular method of ... |
|
DanielG |
User Contributions
|
2 |
2,609 |
12-18-2019, 04:34 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
ajaxdecbe Wrote:
--
What is the advantage of using m 20 instead of m 0?
--
I also read in another post (trying to find it at the moment) that -m 20 has some optimisations making it slightly faster ... |
|
DanielG |
hashcat
|
16 |
9,677 |
04-25-2018, 10:48 AM |
|
|
Thread: Using hashcat (GPU) with simple hash function
Post: RE: Using hashcat (GPU) with simple hash function
Wow what a weird hash, this will have a lot of collisions since the value of every letter is just raised to the 5th power and added, so the order of the letters does not matter (so you will most likel... |
|
DanielG |
hashcat
|
4 |
1,951 |
07-09-2019, 04:54 PM |
|
|
Thread: Using hashcat (GPU) with simple hash function
Post: RE: Using hashcat (GPU) with simple hash function
Okay, I tried to run this code locally and there is indeed a bug if I take the code you posted literally.
The code
Code:
--
hash += (s[i] * s[i] * s[i] * s[i] * s[i]);
--
does not produce the c... |
|
DanielG |
hashcat
|
4 |
1,951 |
07-10-2019, 09:38 AM |
|
|
Thread: Token length exception
Post: RE: Token length exception
Seeing as you are using -m 1000 it is likely you got a password dump in the format "krbtgt:502:aad3b435b51404eeaad3b435b51404ee:abcdef0123456789abcdef0123456789:::" or
"krbtgt:abcdef0123456789abcdef0... |
|
DanielG |
hashcat
|
7 |
23,947 |
02-14-2019, 10:21 AM |
|
|
Thread: Token length exception
Post: RE: Token length exception
extracting hash from MS Excel file can be done by reading this part of the wiki: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_office_word_excel_etc_... |
|
DanielG |
hashcat
|
1 |
1,113 |
09-17-2019, 04:11 PM |
|
|
Thread: Tesla P100 / HC 4.1.0 Benchmarks on Google Cloud
Post: RE: Tesla P100 / HC 4.1.0 Benchmarks on Google Clo...
|
DanielG |
Hardware
|
5 |
6,940 |
04-13-2018, 11:26 AM |
|
|
Thread: Status: Exhausted Bitcoin Wallet Passphrase Recovery
Post: RE: Status: Exhausted Bitcoin Wallet Passphrase Re...
you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none... |
|
DanielG |
hashcat
|
10 |
5,905 |
02-13-2019, 04:40 PM |
|
|
Thread: Status: Exhausted Bitcoin Wallet Passphrase Recovery
Post: RE: Status: Exhausted Bitcoin Wallet Passphrase Re...
suhel1986 Wrote: (02-14-2019, 12:07 AM)
--
Sorry mate I am not so good at this one, now I got following error,
I guessed if the password was 10 to 15 char long I used following command and I got ... |
|
DanielG |
hashcat
|
10 |
5,905 |
02-14-2019, 10:34 AM |
|
|
Thread: SHA-256 Base-64 (?)
Post: RE: SHA-256 Base-64 (?)
You can just attack it as any other hash? I think you will need to be more specific on what isn't clear.
For example, to attack sha-256 you need mode 1400 (https://hashcat.net/wiki/doku.php?id=exam... |
|
DanielG |
hashcat
|
1 |
2,416 |
07-03-2018, 09:17 AM |
|
|
Thread: Running Hashcat on SSH
Post: RE: Running Hashcat on SSH
On https://hashcat.net/wiki/ under "Patches, tips and tricks" there is 'SSH into running terminal (https://hashcat.net/wiki/doku.php?id=ssh_running_process)- using screen' |
|
DanielG |
hashcat
|
3 |
2,608 |
06-18-2019, 09:18 AM |
|
|
Thread: quick SBC opinon
Post: RE: quick SBC opinon
You need to specify in what they should be 'the best'.
I would say none? if you want crack speeds don't use these SBC's but desktops with big GPU's. |
|
DanielG |
General Talk
|
2 |
2,571 |
02-05-2018, 03:36 PM |
|
|
Thread: Question regarding brute forcing hex charsets
Post: RE: Question regarding brute forcing hex charsets
your calculation is wrong, -1 d8d9dadb -2 808182...etc...bebf in combination with ?1?2..etc does not mean 68^n possibilities because you can't just add ?1 and ?2, you are multiplying. For every char ... |
|
DanielG |
hashcat
|
2 |
2,490 |
05-09-2018, 09:46 AM |
|
|
Thread: question about hccapx
Post: RE: question about hccapx
farhad_usa Wrote: (01-08-2018, 07:44 PM)
--
based on this page (https://hashcat.net/wiki/doku.php?id=hccapx)
this is my password/keymic in encrypted :9094e48390f2
--
No, based on that page it... |
|
DanielG |
hashcat
|
2 |
2,644 |
01-09-2018, 04:49 PM |