Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: TOTP brute-force search incomplete?
Post: RE: TOTP brute-force search incomplete?
I think it has to do that a single kernel call can't crack a hash multiple times. There are just way too many collisions for a fast cracker like hashcat.
I think a similar problem/limitation/restri... |
|
philsmd |
hashcat
|
4 |
851 |
06-19-2020, 06:24 PM |
|
|
Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force
it's a very special situation, which requires either a special password generator or a compromise to allow some duplicates for better speed.
The candidate generator could be as simple as this:
Co... |
|
philsmd |
hashcat
|
7 |
1,442 |
06-19-2020, 06:06 PM |
|
|
Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force
it's negligible. the more words, the less likely is that a word occurs multiple times.
As said, you could develop a fast password candidate generator that does all that fancy stuff: combining, conc... |
|
philsmd |
hashcat
|
7 |
1,442 |
06-19-2020, 05:31 PM |
|
|
Thread: Rules doesn't work.
Post: RE: Rules doesn't work.
I can't give any advice about the other tools, but my recommendation is that you just should learn how hashcat works and the hashcat rules etc (see wiki, https://hashcat.net/wiki/) and just focus on h... |
|
philsmd |
hashcat
|
1 |
479 |
06-19-2020, 05:23 PM |
|
|
Thread: Blockchain Wallet
Post: RE: Blockchain Wallet
oh, this is actually interesting that the support team is offering you to kind of spam them with login requests. My guess is that there will still be a limit, it might just be a little bit larger (for... |
|
philsmd |
hashcat
|
6 |
1,279 |
06-19-2020, 09:12 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
What do you mean by "I'm now able to run the attack" ?
Are you able to crack hashes that you have generated as a test ? Did you try to crack the example hash from https://hashcat.net/wiki/example_h... |
|
philsmd |
General Talk
|
10 |
2,590 |
06-18-2020, 12:50 PM |
|
|
Thread: -m 2500 hccapx works on hashcat-5.1.0+1831 but not 6.0
Post: RE: -m 2500 hccapx works on hashcat-5.1.0+1831 but...
what's your command ?
do you use -m 2500 in the command line ? |
|
philsmd |
hashcat
|
1 |
482 |
06-17-2020, 10:05 PM |
|
|
Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force
it's always clever to step back a little bit and first try to understand and analyse the feasibility of this attack and the total keyspace.
My guess is that this is for WPA "hashes", so it's alread... |
|
philsmd |
hashcat
|
7 |
1,442 |
06-17-2020, 07:17 PM |
|
|
Thread: Restoring a WPA session from hashcat 5.1.0 in 6.0.0?
Post: RE: Restoring a WPA session from hashcat 5.1.0 in ...
You could be lucky since the data itself that is stored was not changed directly (actually never changed for years, exactly for "compatibility reasons"... but see reason for updated versoin below), se... |
|
philsmd |
hashcat
|
2 |
664 |
06-17-2020, 03:08 PM |
|
|
Thread: Blockchain Wallet
Post: RE: Blockchain Wallet
my guess is that you already should have a backup of your JSON file downloaded beforehand, ready to be used for recovery and saved to your disk ?
If you didn't make any backups and don't have any fil... |
|
philsmd |
hashcat
|
6 |
1,279 |
06-17-2020, 01:00 PM |
|
|
Thread: €-Symbol with Command ?b
Post: RE: €-Symbol with Command ?b
That's actually the funny and at the same time very difficult part of encoding.
the euro sign € can be also represented by just one byte in other encodings for instance ISO8859-15 has 0xa4 as a cur... |
|
philsmd |
hashcat
|
4 |
809 |
06-16-2020, 10:06 PM |
|
|
Thread: Hashcat don't find my password
Post: RE: Hashcat don't find my password
you could try with latest beta version : https://hashcat.net/beta/
never use --self-test-disable , because it just ignores every sanity check and therefore you are basically ignoring the serious er... |
|
philsmd |
hashcat
|
4 |
877 |
06-16-2020, 02:52 PM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
yeah, it could work... but also the kernel would need to loop over these 256*256 combinations (16 bits) = 65536
which of course would imply a kernel runtime of 65536 times longer :(
That means h... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 11:54 AM |
|
|
Thread: hashcat -b is not seeing my grahpic card
Post: RE: hashcat -b is not seeing my grahpic card
follow this: https://hashcat.net/faq/wrongdriver
and install the driver directly from https://nvidia.com |
|
philsmd |
hashcat
|
4 |
892 |
06-15-2020, 11:33 AM |
|
|
Thread: Generator of fortune
Post: RE: Generator of fortune
what's going on here? one (actually 2) completely new forum accounts without any previous posts suddently talking about a tool with very strange description and furthermore a tool that was already con... |
|
philsmd |
User Contributions
|
8 |
2,022 |
06-15-2020, 11:06 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
yeah, that would work, you just generate the set of hashes with different right part ("salt" aka ciphertext) and try to crack those hashes. In theory it shouldn't be 65536 if the plaintext wasn't rand... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 09:15 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
now you are confusing ciphertext and plaintext
the format of -m 14000 hashes is
8_bytes_ciphertext_in_hex:8_bytes_plaintext_in_hex |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 09:02 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
just one simple thing you could and should do. create a similar container with known password (it could be similar to the one you are trying to crack, just remember always that this is just a test and... |
|
philsmd |
General Talk
|
10 |
2,590 |
06-15-2020, 08:52 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
so you know exactly 4 "bytes" of 8 bytes of the key ? (just remember that of the 8 "bytes" == 8 * 8 bits = 64 bits, 8 of them are parity bits, therefore it's 8*8 - 8 = 64 bits - 8 bits = 56 bits). we ... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 08:39 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
for -m 14000 = DES (PT = $salt, key = $pass)
the "plain text" is the salt and the password is the encryption key
Therefore, with unknown plain text the "hash" would change or you would need to l... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-14-2020, 11:00 PM |