Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).
as we told you already hundreds of times (at least that ... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-05-2019, 05:03 PM |
|
|
Thread: pkzip2
Post: RE: pkzip2
see https://github.com/hashcat/hashcat/pull/1962 , it's work in progress. I have no clue what you are trying to say with that sentence regarding AES, the main problem was that we have to do huffman c... |
|
philsmd |
hashcat
|
2 |
2,977 |
05-03-2019, 07:39 AM |
|
|
Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt
you can use the --outfile (short -o) option and redirect all errors to /dev/null
Code:
--
hashcat -m 0 --show -o outfile.txt hashes.txt 2> /dev/null > /dev/null
--
on windows it's very simil... |
|
philsmd |
hashcat
|
5 |
2,706 |
05-02-2019, 02:00 PM |
|
|
Thread: iTunes backup help...
Post: RE: iTunes backup help...
I think brute-force is a very bad strategy here.
I would stick with dictionary attacks (-a 0) and only if you are sure about a very specific pattern or did already try all possibilities (likely pas... |
|
philsmd |
hashcat
|
10 |
4,436 |
04-30-2019, 07:05 PM |
|
|
Thread: iTunes backup help...
Post: RE: iTunes backup help...
best advice is to remember as much as possible from the password that was (probably) used and build some small (or up to medium) sized dictionary which follows those policies/patterns.
Of course it... |
|
philsmd |
hashcat
|
10 |
4,436 |
04-30-2019, 10:40 AM |
|
|
Thread: Problem with token length exceptions
Post: RE: Problem with token length exceptions
make sure that the args.txt file only contains the arguments starting with -a 3 (not the binary "hashcat32.exe" too)
also make sure that the file "hashes.txt" only contains valid MD5 hashes
you ... |
|
philsmd |
hashcat
|
2 |
1,718 |
04-25-2019, 07:48 PM |
|
|
Thread: Brain is much slower than expected
Post: RE: Brain is much slower than expected
I guess that depends on how large the percentage of rejected passwords is and how fast the algorithm is.
brain doesn't make the H/s speed of your GPUs faster, that only depends on the OpenCL device... |
|
philsmd |
hashcat
|
5 |
2,964 |
04-19-2019, 01:35 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
I guess this is just because you didn't test with the correct password candidate.
hashcat only tries the passwords that you tell it to run.
Maybe this specific hash is harder to crack and you need... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-19-2019, 11:44 AM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 08:26 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
maybe you just didn't understand the posts.
depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600.
... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 07:27 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
see:
https://hashcat.net/forum/thread-6638.html
https://hashcat.net/forum/thread-2563-post-15255.html#pid15255 |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 02:43 PM |
|
|
Thread: Second GPU is not recognized
Post: RE: Second GPU is not recognized
your clinfo basically proofs that it is not hashcat fault because also clinfo only sees a single RX 580 (there is only one GPU in your list).
I would suggest reinstalling the driver and/or messing ... |
|
philsmd |
Hardware
|
2 |
2,021 |
04-18-2019, 12:40 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
so as far as I understood, the question (also in regards to your PM) was how to obtain the intermediate results between the two decryption step. Well, it's just using PBKDF2-HMAC-SHA1 (32 byte output)... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-17-2019, 08:46 AM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
crack the hashes you obtain with with extract-blockchain-second-hash.py -m 18800 = Blockchain, My Wallet, Second Password (SHA256)
if you have removed the double encryption (BOTH encryptions), you ... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 11:12 PM |
|
|
Thread: Brain is much slower than expected
Post: RE: Brain is much slower than expected
I would suggest starting with reading this: https://hashcat.net/forum/thread-7903.html (most importantly the section "Major Feature: The hashcat brain").
of course the brain is most efficient and I... |
|
philsmd |
hashcat
|
5 |
2,964 |
04-16-2019, 10:55 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
as explained here: https://hashcat.net/forum/thread-8288-post-44420.html#pid44420
the only way to obtain the second hash for -m 18800 (you of course need to crack the second hash for the second passw... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 10:43 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
I've modified your latest post, because you shouldn't post private/sensitive info here (the forum rules say do not post hashes in public).
If the the wallet has double_encryption enabled you probab... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 10:10 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
maybe you should contact your email service provider and/or the blockchain support !?
There is also no such thing as decoded blockchain hash or decrypted hash. hashes can sometimes be cracked (but ... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 08:42 PM |
|
|
Thread: token length exception
Post: RE: token length exception
sha1 is -m 100 see https://hashcat.net/wiki/example_hashes |
|
philsmd |
hashcat
|
2 |
2,485 |
04-15-2019, 06:41 PM |
|
|
Thread: Slow bcrypt
Post: RE: Slow bcrypt
you can't change the iteration count (cost settings) without making the hash uncrackable. Therefore, technically you could change it, but it won't crack for sure with wrong settings.
btw. you didn'... |
|
philsmd |
hashcat
|
4 |
2,604 |
04-15-2019, 02:15 PM |