Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[desc]
|
|
|
Thread: Hashcat DES restore file manual EDIT
Post: RE: Hashcat DES restore file manual EDIT
endianness !
If you do not understand the format, you could just use analyze_hc_restore.pl from https://github.com/philsmd/analyze_hc_restore instead (perl must be installed of course) |
|
philsmd |
hashcat
|
2 |
1,079 |
12-27-2019, 10:39 AM |
|
|
Thread: Isn't there anyone who could have tested an RX 5700 XT with myROCm on linux
Post: RE: Isn't there anyone who could have tested an RX...
I don't really understand this at all... is this your repository ?
I don't see any code within this repository, what does it do ? just a manual ? |
|
philsmd |
Hardware
|
7 |
4,315 |
12-27-2019, 10:42 AM |
|
|
Thread: Wordlist + Bruteforce Attack
Post: RE: Wordlist + Bruteforce Attack
just read the output of
Code:
--
hashcat --help
--
it says
Code:
--
- [ Attack Modes ] -
...
6 | Hybrid Wordlist + Mask
--
therefore it is just:
Code:
--
hashcat -a 6 -m 1372... |
|
philsmd |
hashcat
|
2 |
2,079 |
12-27-2019, 07:55 PM |
|
|
Thread: having trouble with hashcat working with gpu's
Post: RE: having trouble with hashcat working with gpu's
first step: uninstall pocl |
|
philsmd |
hashcat
|
5 |
1,707 |
12-29-2019, 09:22 AM |
|
|
Thread: Hashcat exhausted. Is it a problem with the dict. or me?
Post: RE: Hashcat exhausted. Is it a problem with the di...
Do *NOT* post hashes
- https://hashcat.net/forum/announcement-2.html - |
|
philsmd |
hashcat
|
3 |
1,367 |
12-30-2019, 09:26 AM |
|
|
Thread: hcmask file with custom charset usage
Post: RE: hcmask file with custom charset usage
everything must be defined within the hcmask file.
the format is very clear and also allows using hcchr files etc within the hcmask file directly.
You can't (and are NOT allowed) to define custo... |
|
philsmd |
hashcat
|
2 |
1,143 |
12-31-2019, 03:50 PM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
The general idea is good @backtraffic... but ...
we really are trying hard to discourage the use of hardware without (good) cooling solutions here. so it's probably better to say: do NOT use any l... |
|
philsmd |
hashcat
|
11 |
8,625 |
01-03-2020, 11:48 AM |
|
|
Thread: build fail in kernel? -m 2500, cant figure out why
Post: RE: build fail in kernel? -m 2500, cant figure out...
which hashcat version do you use ?
did you try to test the beta version from https://hashcat.net/beta/ ? |
|
philsmd |
hashcat
|
3 |
1,115 |
01-03-2020, 05:57 PM |
|
|
Thread: i need to know a password
Post: RE: i need to know a password
no. that's not what hashcat does. You are banned for a week for posting private information of (other) users (email addresses) and requesting to do (online) cracks for you. Thread closed. |
|
philsmd |
hashcat
|
1 |
925 |
01-05-2020, 12:13 PM |
|
|
Thread: Can shannon entropy be used to optimize password carcking?
Post: RE: Can shannon entropy be used to optimize passwo...
what attack type ?
hashcat has built-in support for markov chains see --help
it's probably not a good idea to have/generate password candidates that are gibberish ... and store large dictionarie... |
|
philsmd |
hashcat
|
3 |
1,377 |
01-07-2020, 12:08 PM |
|
|
Thread: Mask 0123456789
Post: RE: Mask 0123456789
https://hashcat.net/wiki/?id=mask_attack
Code:
--
hashcat64.exe -m 2500 -a 3 -o www.txt C:\ha\20488_1578425546.hccapx ?d?d?d?d?d?d?d?d
--
|
|
philsmd |
hashcat
|
4 |
1,383 |
01-07-2020, 09:59 PM |
|
|
Thread: Mask 0123456789
Post: RE: Mask 0123456789
https://hashcat.net/wiki/?id=mask_attack#custom_charsets
the general idea will be the same and won't change, if you do not know how to do it, you can simple read the explanation on the wiki page, t... |
|
philsmd |
hashcat
|
4 |
1,383 |
01-07-2020, 11:05 PM |
|
|
Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...
it seems that the algorithm is quite simple and there are a lot of alternative implementations.
as a test I tried to find out if I'm able to recover/find the password of the example file from here:... |
|
philsmd |
General Talk
|
20 |
5,128 |
01-09-2020, 01:52 AM |
|
|
Thread: How to view SSID of cracked PMKID (16800) PCAP?
Post: RE: How to view SSID of cracked PMKID (16800) PCAP...
the SSID is within the output, CamandAri is the SSID
hint: hexadecimal |
|
philsmd |
hashcat
|
6 |
2,259 |
01-12-2020, 09:08 AM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
it should also work with just adding -S to the command line |
|
philsmd |
User Contributions
|
648 |
487,348 |
01-12-2020, 07:10 PM |
|
|
Thread: Hashcat on VPS (CPU only)
Post: RE: Hashcat on VPS (CPU only)
Why would you even think about using these old versions of hashcat ?
Do not use --force
uninstall all the non-vendor drivers (the open source drivers like Mesa/Pocl etc)
Try to fix the clinfo... |
|
philsmd |
hashcat
|
6 |
1,842 |
01-13-2020, 04:49 PM |
|
|
Thread: CL_INVALID_VALUE - yes, OpenCL is installed
Post: RE: CL_INVALID_VALUE - yes, OpenCL is installed
does the beta work for you https://hashcat.net/beta/ ? |
|
philsmd |
hashcat
|
2 |
1,104 |
01-14-2020, 09:36 AM |
|
|
Thread: Using hashcat Brain with slow hash and specific password length
Post: RE: Using hashcat Brain with slow hash and specifi...
if you have a minimum required length of 12 and rules that add up to 4 characters, you could just pre-process your dict such that it has at least 12-4 = 8 characters. That's already a huge filter and ... |
|
philsmd |
hashcat
|
4 |
1,381 |
01-14-2020, 12:52 PM |
|
|
Thread: Create PKZIP Master Key
Post: RE: Create PKZIP Master Key
do not post hashes in this forum, see https://hashcat.net/forum/announcement-2.html
The example hashes are here: https://hashcat.net/wiki/example_hashes (hint: they do not have any file names etc, ... |
|
philsmd |
hashcat
|
4 |
1,849 |
01-14-2020, 03:36 PM |
|
|
Thread: Create PKZIP Master Key
Post: RE: Create PKZIP Master Key
you do not use the output of zip2john at all for -m 20500 or -m 20510.
you just use the key that bkcrack will give you if you have succeeded with a known plaintext attack |
|
philsmd |
hashcat
|
4 |
1,849 |
01-14-2020, 03:51 PM |