Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting. |
|
DanielG |
hashcat
|
11 |
8,625 |
01-06-2020, 05:50 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
I don't get what your goal is here, any domain admin can change the password of the account so that is your best option.
You don't need to crack the NTLM hash for most other 'less-ethical' use cas... |
|
DanielG |
hashcat
|
11 |
8,625 |
01-03-2020, 09:43 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
|
DanielG |
hashcat
|
11 |
8,625 |
01-09-2020, 09:48 AM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Oh wow, why would they make that choice, using just DES and key "61d0e54954733b80" decodes it indeed (https://gchq.github.io/CyberChef/#recipe=DES_Decrypt(%7B'option':'Hex','string':'61d0e54954733b80'... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 10:37 AM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
If they store the passwords locally they seem to use "the strongly secure SHA format"
https://manuals.gfi.com/en/kerio/connect/content/assets/add_user.png
https://manuals.gfi.com/en/kerio/connect/... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-12-2018, 01:05 PM |
|
|
Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect
Awesome debugging powers to get that info! Seems to be 3DES indeed with key "61d0e54954733b8080808080808080808080808080808080".
Decoding D3S:8742ddf7db1906c5d54ec948c500e587adfa4447eff8dc42adfa4447... |
|
DanielG |
hashcat
|
10 |
8,847 |
06-15-2018, 09:36 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
ajaxdecbe Wrote:
--
What is the advantage of using m 20 instead of m 0?
--
I also read in another post (trying to find it at the moment) that -m 20 has some optimisations making it slightly faster ... |
|
DanielG |
hashcat
|
16 |
9,677 |
04-25-2018, 10:48 AM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
Hi, you would probably already be cracking if you followed the information on the wiki (https://hashcat.net/wiki/). Here you can follow the steps needed to crack your hash:
https://hashcat.net/wiki/d... |
|
DanielG |
hashcat
|
11 |
12,044 |
01-09-2018, 05:31 PM |
|
|
Thread: MD5 Help
Post: RE: MD5 Help
?1 is indeed how you access the custom charset mentioned. In the example I put 12 "?1" combinations because that is your max length for your password. This makes it easy if you decide to try somethi... |
|
DanielG |
hashcat
|
11 |
12,044 |
01-11-2018, 10:31 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
You can also just use the "Avatar URL" functionality and use your URL https://a.pomf.cat/dbrbzz.jpg or any other image service host. |
|
DanielG |
hashcat
|
18 |
12,096 |
04-16-2018, 09:33 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Make your avatar a PNG file (not jpg), since you are only using 2 colours and simple design it will make it a very small file. If it is below 10K just upload it here, otherwise:
Upload your avatar ... |
|
DanielG |
hashcat
|
18 |
12,096 |
04-16-2018, 11:35 AM |
|
|
Thread: Hi guys
Post: RE: Hi guys
Yeah, maybe Atom (https://hashcat.net/forum/user-1.html) disabled this feature recently. |
|
DanielG |
hashcat
|
18 |
12,096 |
04-17-2018, 10:34 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
Yeah what philsmd said.
The wrong login response was just the assumption you intercepted a random person logging in to the system. However the Arabic text after the login attempt says that the log... |
|
DanielG |
General Talk
|
27 |
14,953 |
02-21-2019, 11:42 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
On https://miloserdov.org/?p=1088 it says the hash 15b4c47a3e0e44b9e40db20ac1225023 is for hexMD5('\301' + "22222222" + '\237\174\357\335\234\211\367\356\273\105\215\277\226\361\103\120') on the scr... |
|
DanielG |
General Talk
|
27 |
14,953 |
02-19-2019, 02:04 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
I think this is going past what hashcat is about and more turning in how you can hack a certain piece of software.
You have all the information in this topic (and external sources) to understand inter... |
|
DanielG |
General Talk
|
27 |
14,953 |
02-22-2019, 10:23 AM |
|
|
Thread: cracking salted SHA1
Post: RE: cracking salted SHA1
Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like. |
|
DanielG |
hashcat
|
14 |
19,731 |
06-28-2018, 04:08 PM |
|
|
Thread: OpenCl kernel self-test failed when using any version later than v4.2.1 !!
Post: RE: OpenCl kernel self-test failed when using any ...
https://66.media.tumblr.com/c560849f3c57fc6ed3c0ef57cff43277/tumblr_inline_nkirl9V7Sg1s9de7o.jpg |
|
DanielG |
hashcat
|
29 |
21,222 |
02-06-2019, 10:38 AM |
|
|
Thread: Token length exception
Post: RE: Token length exception
Seeing as you are using -m 1000 it is likely you got a password dump in the format "krbtgt:502:aad3b435b51404eeaad3b435b51404ee:abcdef0123456789abcdef0123456789:::" or
"krbtgt:abcdef0123456789abcdef0... |
|
DanielG |
hashcat
|
7 |
23,963 |
02-14-2019, 10:21 AM |
|
|
Thread: hashcat v4.2.0
Post: RE: hashcat v4.2.0
the links are https://hashcat.net/files/hashcat-4.2.0.7z and https://hashcat.net/files/hashcat-4.2.0.tar.gz |
|
DanielG |
hashcat
|
10 |
27,941 |
08-03-2018, 08:59 AM |