Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Configuration problem
Post: RE: Configuration problem
E3AAD692DB9443A8A694C9DD63DD2F9CF354F27D is not the SHA1 of 'kadi1830'. The SHA1 is 782D8C9077AE7989F7453B29392414C089879EA8. So that's why you are not cracking it.
How did you make this hash?
... |
|
DanielG |
hashcat
|
1 |
1,692 |
08-06-2018, 10:13 AM |
|
|
Thread: cryptomator
Post: RE: cryptomator
Looking at https://cryptomator.org/security/architecture/ it looks like it is scrypt which is supported by hashcat: https://hashcat.net/wiki/doku.php?id=example_hashes
You will need to figure out... |
|
DanielG |
hashcat
|
1 |
1,695 |
08-07-2018, 11:01 AM |
|
|
Thread: Can you resume if HC crashes?
Post: RE: Can you resume if HC crashes?
just type the AT, so AT?u?u?u?u?u?u |
|
DanielG |
hashcat
|
5 |
1,762 |
08-13-2019, 01:31 PM |
|
|
Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow
Ulfr11 Wrote: (02-27-2020, 04:36 AM)
--
?h is much faster mask than ?a in brute Force attacks
--
Yes, counting to 10 is faster than counting to 100. |
|
DanielG |
hashcat
|
5 |
1,805 |
02-27-2020, 02:48 PM |
|
|
Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies
I would suggest getting a text editor with nice features such as Notepad++, this has a more powerful search and replace functionality (using regex for example). Then with a few tutorials you can edit ... |
|
DanielG |
hashcat
|
6 |
1,858 |
08-16-2019, 03:19 PM |
|
|
Thread: Using hashcat (GPU) with simple hash function
Post: RE: Using hashcat (GPU) with simple hash function
Wow what a weird hash, this will have a lot of collisions since the value of every letter is just raised to the 5th power and added, so the order of the letters does not matter (so you will most likel... |
|
DanielG |
hashcat
|
4 |
1,953 |
07-09-2019, 04:54 PM |
|
|
Thread: Using hashcat (GPU) with simple hash function
Post: RE: Using hashcat (GPU) with simple hash function
Okay, I tried to run this code locally and there is indeed a bug if I take the code you posted literally.
The code
Code:
--
hash += (s[i] * s[i] * s[i] * s[i] * s[i]);
--
does not produce the c... |
|
DanielG |
hashcat
|
4 |
1,953 |
07-10-2019, 09:38 AM |
|
|
Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow
This looks like exactly as the reason why password tools (like Keepass) use the algorithms they use. You should be slow at brute-forcing it, that's the point. I made a Keepass file with 100000 rounds ... |
|
DanielG |
hashcat
|
3 |
2,010 |
10-29-2018, 12:14 PM |
|
|
Thread: Can external code used as a custom hash for hashcat?
Post: RE: Can external code used as a custom hash for ha...
You can code a new kernel, with functions seen here: https://github.com/hashcat/hashcat/tree/master/OpenCL for example https://github.com/hashcat/hashcat/blob/master/OpenCL/m11300-pure.cl is for the ... |
|
DanielG |
hashcat
|
1 |
2,031 |
12-23-2018, 08:24 PM |
|
|
Thread: MD5 question
Post: RE: MD5 question
1. know exactly how many times it is hashed (3,4,5,etc)
2. write a custom kernel that can handle the exact amount of md5 rounds |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 10:01 AM |
|
|
Thread: MD5 question
Post: RE: MD5 question
mdxfind looks cool, https://www.techsolvency.com/pub/bin/mdxfind/
"Multi-iteration: can try thousands of iteration counts of any of these core algorithms".
On https://www.techsolvency.com/pub/bin/... |
|
DanielG |
hashcat
|
6 |
2,051 |
10-31-2019, 12:24 PM |
|
|
Thread: Help brute forcing a SHA512 7-character password
Post: RE: Hire someone to brute force a single SHA512 7-...
https://hashcat.net/forum/announcement-2.html
"Do not ask people to crack your hash. It does not matter if you are willing to pay." |
|
DanielG |
General Talk
|
2 |
2,075 |
01-11-2019, 01:52 PM |
|
|
Thread: word combinations with masks between
Post: RE: word combinations with masks between
I think the easiest way is to generate a wordlist on your own with the 2 passwords and every character or two between them (if you can't program, try making it in excel with the standard tables). Then... |
|
DanielG |
General Talk
|
2 |
2,118 |
11-14-2018, 04:32 PM |
|
|
Thread: Help with lotus ID password
Post: RE: Help with lotus ID password
Looking for this online I mainly see posts on how to use the "Recover Password" (https://searchdomino.techtarget.com/tip/Resetting-a-Lotus-Notes-password) with a special token that a Notes administrat... |
|
DanielG |
hashcat
|
2 |
2,131 |
12-19-2018, 10:14 AM |
|
|
Thread: CL_PLATFORM_NOT_FOUND_KHR - Windows 10 and GeForce 1060
Post: RE: CL_PLATFORM_NOT_FOUND_KHR - Windows 10 and GeF...
Glad you solved it, also thanks you took the time to report back with the solution. |
|
DanielG |
hashcat
|
2 |
2,174 |
03-21-2019, 12:23 PM |
|
|
Thread: Is this a known and implemented algo?
Post: RE: Is this a known and implemented algo?
Looks like the CRC32 table and method, only on end it does XOR $68DBAF89.
So my guess is to use hashcat -m 11500 but first manually XOR the recovered data out of registry with 0x68DBAF89.
//edit... |
|
DanielG |
hashcat
|
3 |
2,236 |
04-11-2019, 11:11 AM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
You don't want to do this.
Assuming your command will work, length 64 brute force with a-z 0-9 is not going to work. Let's find out why:
Let's assume you have 149,000$ and buy a 8 NVIDIA Tesla... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 02:27 PM |
|
|
Thread: Need help with inputs
Post: RE: Need help with inputs
No problem, for the rest of the technical questions you can try https://hashcat.net/wiki/doku.php?id=mask_attack and https://hashcat.net/wiki/doku.php?id=hashcat for the correct commandline options. I... |
|
DanielG |
hashcat
|
3 |
2,248 |
09-28-2018, 03:40 PM |
|
|
Thread: Which Hash modes should be chosen by NThash ciphertext?
Post: RE: Which Hash modes should be chosen by NThash ci...
Yes -m 1000 is for NTLM, see https://hashcat.net/wiki/doku.php?id=example_hashes for example hashes to check if your hash is in the correct format. |
|
DanielG |
hashcat
|
2 |
2,312 |
02-01-2018, 11:58 AM |
|
|
Thread: Identifying 53-char hash type
Post: RE: Identifying 53-char hash type
Could be itoa64 (kind of base64 encoding), see https://gchq.github.io/CyberChef/#recipe=From_Base64('./0-9A-Za-z%3D',true)To_Hexdump(16,false,true)&input=Y3l6V1h3SFhaQlBueHRCYWxGcFFpT3NCdlo1a21RcFdSb... |
|
DanielG |
General Talk
|
1 |
2,328 |
02-22-2018, 02:18 PM |