Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: potfile wpa format/derivation
Post: RE: potfile wpa format/derivation
To be honest, when I wrote that I believed that we had added a whole paragraph about the new -m 22000 format here: https://hashcat.net/forum/thread-9303.html (but we only mentioned that WPA-PBKDF2-PMK... |
|
philsmd |
hashcat
|
6 |
414 |
09-15-2020, 10:49 AM |
|
|
Thread: potfile wpa format/derivation
Post: RE: potfile wpa format/derivation
an independent checksum that is used to identify/find the correct hash, see https://github.com/hashcat/hashcat/blob/8207af471cee80012d370d551653d28516abf0c1/src/modules/module_02500.c#L756-L823
you... |
|
philsmd |
hashcat
|
6 |
414 |
09-15-2020, 07:50 AM |
|
|
Thread: Problem with cracking Office password that contains custom character
Post: RE: Problem with cracking Office password that con...
unfortunately, there is no way to fully get it without trying to learn about character encoding and what utf16le means etc.
There is no shortcut. You need to understand the way characters are represe... |
|
philsmd |
hashcat
|
13 |
987 |
09-14-2020, 05:19 PM |
|
|
Thread: Problem with cracking Office password that contains custom character
Post: RE: Problem with cracking Office password that con...
why don't you just explain what you did and how you run it. That might reveal the problem you are facing much faster:
Code:
--
hashcat.exe -a 3 -m 9600 --hex-charset --self-test-disable hash.txt 0... |
|
philsmd |
hashcat
|
13 |
987 |
09-14-2020, 02:50 PM |
|
|
Thread: Problem with cracking Office password that contains custom character
Post: RE: Problem with cracking Office password that con...
encoding is difficult
and without understanding it, you probably shouldn't make these source code changes and do such advanced attacks. We have several confirmations of users that moved the encodin... |
|
philsmd |
hashcat
|
13 |
987 |
09-13-2020, 04:45 PM |
|
|
Thread: Problem with cracking Office password that contains custom character
Post: RE: Problem with cracking Office password that con...
if you modify the kernel code such that it's not doing the same thing as it is supposed to do (among others, convert the passwords to utf16le within the kernel), then and only then you need to use thi... |
|
philsmd |
hashcat
|
13 |
987 |
09-13-2020, 02:32 PM |
|
|
Thread: Ruijie Networks (Router) Hashes Help!
Post: RE: Ruijie Networks (Router) Hashes Help!
what do you mean by reverse ?
what is the password ?
it's actually not allowed to post any hashes here, see forum rules
did you try to use a much longer password to see if the ouput is always... |
|
philsmd |
hashcat
|
2 |
333 |
09-13-2020, 11:50 AM |
|
|
Thread: Problem with cracking Office password that contains custom character
Post: RE: Problem with cracking Office password that con...
Code:
--
--encoding-to utf16le
--
and this of course only works in a dictionary attack (-a 0), if you want to use -a 3 you would need to use the correct bytes with --hex-charset
if you want ... |
|
philsmd |
hashcat
|
13 |
987 |
09-12-2020, 07:27 PM |
|
|
Thread: Problem with cracking Office password that contains custom character
Post: RE: Problem with cracking Office password that con...
this question has already been answered dozens of times:
https://hashcat.net/forum/thread-8456.html
https://github.com/hashcat/hashcat/blob/8207af471cee80012d370d551653d28516abf0c1/docs/limits.txt... |
|
philsmd |
hashcat
|
13 |
987 |
09-12-2020, 06:24 PM |
|
|
Thread: email: pass after dehashed
Post: RE: email: pass after dehashed
after you crack the hashes (it's twofold) :
https://hashcat.net/faq#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword |
|
philsmd |
hashcat
|
4 |
510 |
09-11-2020, 08:02 AM |
|
|
Thread: 1080 ti slow percent
Post: RE: 1080 ti slow percent
add this to your command:
Code:
--
-O
--
what do you mean by 30/35 % . Where do you see this ?
The output of hashcat says:
Temp is 64c
Fan is 37 %
Util is 100%
If you are talking abou... |
|
philsmd |
Hardware
|
2 |
503 |
09-09-2020, 09:32 PM |
|
|
Thread: Hashcat save/restore
Post: RE: Hashcat save/restore
My suggestion still makes sense, hashcat has built-in support for masks:
https://hashcat.net/wiki/doku.php?id=mask_attack
you do not need to use crunch and you do not need to use any word list, ju... |
|
philsmd |
hashcat
|
3 |
411 |
09-08-2020, 12:55 PM |
|
|
Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile
the name of the potfile depends on the session name:
if you use --session ses , then your file name of the potfile is: ses.potfile |
|
philsmd |
hashcat
|
14 |
1,235 |
09-08-2020, 12:50 PM |
|
|
Thread: Hashcat save/restore
Post: RE: Hashcat save/restore
best solution is to not use crunch:
Code:
--
hashcat -m 2500 -a 3 -o output_test -2 abc123 test.hccapx ?2?2?2?2?2?2?2?2
--
|
|
philsmd |
hashcat
|
3 |
411 |
09-08-2020, 12:47 PM |
|
|
Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?
well, that sounds like a very different problem compared to the problem we were discussing above to "just" have some alternatives/sets of replacement for a single character (like "try both sa4 and sa@... |
|
philsmd |
hashcat
|
10 |
964 |
09-03-2020, 09:33 PM |
|
|
Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?
no, I think in this case it's different.
There are 11 sets and some of them are a set (or a OR) , like this:
Code:
--
(['sa4', 'sa@'], ['sb6'], ['sc |
|
philsmd |
hashcat
|
10 |
964 |
09-01-2020, 02:36 PM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
it's not really safe to do it this way, but you could for instance use something like this:
Code:
--
hashcat --stdout -a 3 [THE_MASK] | grep -n -m 1 '^[THE_FALSE_POSITVE_PASSWORD]$'
--
then ... |
|
philsmd |
General Talk
|
6 |
855 |
08-30-2020, 09:20 PM |
|
|
Thread: howto: convert btcrecover bc: hashes to hashcat hash format
Post: howto: convert btcrecover bc: hashes to hashcat ha...
Recently an user contacted me via forum PM on how to convert a "bc:" hash extracted by btcrecover from a bitcoin wallet (wallet.dat) to the format that hashcat supports:
Code:
--
-m 11300 = Bitcoi... |
|
philsmd |
User Contributions
|
0 |
344 |
08-30-2020, 11:51 AM |
|
|
Thread: Intel GPU / CPU not found
Post: RE: Intel GPU / CPU not found
do you now use the latest hashcat version ?
which operating system do you use ? |
|
philsmd |
hashcat
|
5 |
843 |
08-29-2020, 03:02 PM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
you could try with --keep-guessing and see how many false positives you get.
Since it's a crc32 checksum it's not impossible (the decompression errors in case of compression of course would prevent... |
|
philsmd |
General Talk
|
6 |
855 |
08-29-2020, 02:07 PM |