Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Bruteforce mode / pw length
Post: RE: Bruteforce mode / pw length
fernando Wrote: (05-10-2018, 07:50 PM)
--
Hi.
Is there a way to run hashcat in a bruteforce mode with a specified minimum password length?
--
Yes, check out the increment and increment minimum ... |
|
plaverty9 |
hashcat
|
1 |
2,076 |
05-10-2018, 08:02 PM |
|
|
Thread: insert a character after each character
Post: insert a character after each character
I'm reading https://hashcat.net/wiki/doku.php?id=rule_based_attack and I see ipX, which seems kind of what I want, but I want to be able to tell it to do it after every character. Do I just need to w... |
|
plaverty9 |
General Talk
|
2 |
2,527 |
05-10-2018, 06:54 AM |
|
|
Thread: keep-guessing + rules?
Post: RE: keep-guessing + rules?
I kinda feel like that if you don't know the answer to something that it is likely unknowable. |
|
plaverty9 |
hashcat
|
2 |
2,178 |
06-18-2018, 10:54 PM |
|
|
Thread: Can`t find NTLMv2 Hash
Post: RE: Can`t find NTLMv2 Hash
In my experience, when I capture an NTLMv2 hash, the output explicitly says that. So maybe you're not capturing them? |
|
plaverty9 |
hashcat
|
2 |
2,358 |
06-26-2018, 08:32 PM |
|
|
Thread: Learn Next?
Post: Learn Next?
Once someone has gotten up to speed on the basics of hashcat, like using various rules/wordlists, playing with masks, finding that ones that seem to work best, what would you suggest that a noob learn... |
|
plaverty9 |
hashcat
|
2 |
2,034 |
07-06-2018, 08:27 PM |
|
|
Thread: Learn Next?
Post: RE: Learn Next?
Awesome. Thank you Royce. And you're right about the emerging patterns. I'm really enjoying "discovering" which masks work best for me. As an example, I just ran a data set of 137,000 passwords I've r... |
|
plaverty9 |
hashcat
|
2 |
2,034 |
07-06-2018, 08:44 PM |
|
|
Thread: how to set mask
Post: RE: how to set mask
For each character that you think is a digit, use ?d. If you know parts of it, you can feed that in. Using your example, you can use: 200002?d?d?d?d?d?d?d?d?d2018053019184400100426
But you'll need... |
|
plaverty9 |
hashcat
|
3 |
2,640 |
06-02-2018, 12:44 PM |
|
|
Thread: how to set mask
Post: RE: how to set mask
If you don't know the order then yes, you'll need to try all of them, which I think might take a really long time, especially if you don't know how many characters are missing. If you know how many ch... |
|
plaverty9 |
hashcat
|
3 |
2,640 |
06-06-2018, 02:51 PM |
|
|
Thread: MD5 mask for password
Post: RE: MD5 mask for password
3.4028237e+38 seems like an awful lot of combinations. |
|
plaverty9 |
hashcat
|
3 |
2,958 |
06-27-2018, 05:42 PM |
|
|
Thread: What is the hashcat rule to append numbers from 0 to 9999 at the end?
Post: RE: What is the hashcat rule to append numbers fro...
What atom said but also add --increment to get every number from 0 to 9999 |
|
plaverty9 |
hashcat
|
3 |
3,183 |
07-24-2018, 02:31 PM |
|
|
Thread: help with sha256
Post: RE: help with sha256
You used a wordlist instead of a mask. If it's exhausted, this means the password is not in the rockyou list. You can run rules on the rockyou wordlist, which might help. Do the same crack as you did ... |
|
plaverty9 |
hashcat
|
3 |
2,527 |
08-16-2018, 08:07 PM |
|
|
Thread: help with sha256
Post: RE: help with sha256
If you know what mask matches, or will crack it, you can add -a3 and then add the specific mask that you want to use, drop the rules and drop the wordlist. |
|
plaverty9 |
hashcat
|
3 |
2,527 |
08-16-2018, 08:08 PM |
|
|
Thread: Need piping?
Post: Need piping?
We want to uppercase each word in the wordlist and append four digits to the end. So it seems our options are to create 10,000 $X rules with c or is the only other option to run them one at a time and... |
|
plaverty9 |
hashcat
|
3 |
2,204 |
11-08-2018, 12:04 AM |
|
|
Thread: Need piping?
Post: RE: Need piping?
royce Wrote: (11-08-2018, 12:07 AM)
--
You can mix and match as needed - part rules, part external. A pure-rules approach will be fastest.
--
Do I need to write 10,000 rules for the 0000 to 9999? I... |
|
plaverty9 |
hashcat
|
3 |
2,204 |
11-08-2018, 12:12 AM |
|
|
Thread: Parameters for crack ETH wallet password
Post: RE: Parameters for crack ETH wallet password
hashcat64.exe -m15700 -1 gG ?1?1?d?d?d?d?d?d?d?1?1 -a3 -w4 -O
If the password is formatted like you suggested, that should crack pretty quickly. It says to test the first two and last two character... |
|
plaverty9 |
hashcat
|
4 |
3,247 |
09-30-2018, 03:43 AM |
|
|
Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce
Yep, use attack mode 3 and then your guess and then a mask. So if you need 7-10 more chars, you can do:
-a3 guess?a?a?a?a?a?a?a?a?a?a?a --increment --increment-minimum=7
But if you don't know ... |
|
plaverty9 |
hashcat
|
5 |
4,162 |
05-22-2018, 04:13 PM |
|
|
Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce
Yep, use:
-a3 -1 ?u?l?d guess?1?1?1?1?1?1?1?1?1?1 --increment --increment-minimum=7
But seriously, it could take years. The more characters you can remember, the shorter it'll be. |
|
plaverty9 |
hashcat
|
5 |
4,162 |
05-22-2018, 04:52 PM |
|
|
Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce
WhalingWizard Wrote: (05-22-2018, 05:07 PM)
--
plaverty9 Wrote: (05-22-2018, 04:52 PM)
--
Yep, use:
-a3 -1 ?u?l?d guess?1?1?1?1?1?1?1?1?1?1 --increment --increment-minimum=7
But seriously, i... |
|
plaverty9 |
hashcat
|
5 |
4,162 |
05-23-2018, 05:26 PM |
|
|
Thread: Weird estimated time
Post: RE: Weird estimated time
starkkh Wrote: (06-05-2018, 04:36 AM)
--
Hi everybody ,
Anytime I want to run a brute force attack with masks or a rule based attack I have really really long estimated time now I just tried anot... |
|
plaverty9 |
hashcat
|
5 |
3,464 |
06-05-2018, 04:01 PM |
|
|
Thread: Launch hashcat with conrete letters in password counts
Post: RE: Launch hashcat with conrete letters in passwor...
I'd do that anyway. It should be fast. 7 chars with a keyspace of 3 should be super fast. |
|
plaverty9 |
hashcat
|
5 |
3,289 |
07-06-2018, 04:48 PM |