Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
that's good that you mention this fact/doubt about the private key vs seed, chick3nman
I assumed that the OP (uprising_bike) is sure that s/he has (part of) the seed, not the private key instead (t... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-30-2018, 07:56 AM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
the ciphertext gets decrypted into the raw seed if you have the correct password/AES key/
see my perl code https://github.com/hashcat/hashcat/issues/1279#issuecomment-351716733
Code:
--
my $h... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 09:48 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
hashcat uses ?H for 0123456789ABCDEF
therefore you could specify the mask as -a 3 --hex-charset [someting]?H[somethingElse]?H?H02
the main problem now is that the hash mode -m 5000 only supports a... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 05:46 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
The 5 missing bytes will still be 256 * 256 * 256 * 256 * 256 = 256 ^ 5 = 1099511627776 combinations.
That's a quite huge keyspace, even if the hashing algortihm (keccak) is quite fast.
of course ... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 04:59 PM |
|
|
Thread: hi guys please a little help with hashcat
Post: RE: hi guys please a little help with hashcat
you are using the wrong tools to capture the wlan traffic and you should give more details about your output.
to capture the data you should use hcxtools, like recommended all around this forum etc... |
|
philsmd |
hashcat
|
12 |
8,236 |
06-28-2018, 07:19 AM |
|
|
Thread: Pass for Veracrypt file container, algorithm Twofish-Serpent
Post: RE: Pass for Veracrypt file container, algorithm T...
1. dd (dd.exe) can be used on windows too to extract the bytes
2. you are probably confusing the data length that needs to be decrypted to verify if the password was correct with the key length ("gen... |
|
philsmd |
hashcat
|
1 |
1,855 |
06-18-2018, 07:57 PM |
|
|
Thread: Been away for a while
Post: RE: Been away for a while
|
philsmd |
hashcat
|
4 |
3,509 |
06-12-2018, 07:58 PM |
|
|
Thread: Trouble finding attacking hash format
Post: RE: Trouble finding attacking hash format
You can find example hashes here: https://hashcat.net/wiki/doku.php?id=example_hashes
The salt doesn't need to be hex encoded, only the hashes are hexadecimal (but you can alternatively still use the... |
|
philsmd |
hashcat
|
6 |
3,968 |
06-09-2018, 08:54 AM |
|
|
Thread: Trouble finding attacking hash format
Post: RE: Trouble finding attacking hash format
If base64 encoded : base64 decode it and hex encode it (whenever hashcat expects the hexadecimal hashes)
BTW: it is not allowed to post hashes on this forum |
|
philsmd |
hashcat
|
6 |
3,968 |
06-09-2018, 08:03 AM |
|
|
Thread: Password Manager .rfp file analysis
Post: Password Manager .rfp file analysis
Some days ago I was privately (via PMs) contacted by a hashcat user and they asked if I knew if hashcat could deal with database files from RoboForm (a seemingly well-known and often recommended passw... |
|
philsmd |
User Contributions
|
1 |
4,515 |
06-06-2018, 06:47 AM |
|
|
Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...
you could for instance just decrypt/open the file (I already mentioned how to do this with libreoffice here: https://hashcat.net/forum/thread-7216-post-39498.html#pid39498) |
|
philsmd |
User Contributions
|
36 |
134,713 |
05-25-2018, 02:33 PM |
|
|
Thread: downside os speeding up hashcat with VirtualBox
Post: RE: downside os speeding up hashcat with VirtualBo...
I'm pretty sure that this is caused by some kind of power-level settings. Several hardware components can be either in max. power/performance mode or be in a energy-saving mode. This could also be the... |
|
philsmd |
hashcat
|
1 |
2,635 |
05-13-2018, 06:18 PM |
|
|
Thread: Solution to use very large wordlist
Post: RE: Solution to use very large wordlist
What is the hash type ? -m ?
For instance -m 2500 = WPA/WPA2 has a minimum password length of 8 characters
You should also think if it is possible to replace the huge file with a more clever str... |
|
philsmd |
hashcat
|
4 |
3,817 |
05-12-2018, 03:41 PM |
|
|
Thread: Increment knowing the last chars of password
Post: RE: Increment knowing the last chars of password
... or hashcat mask files (https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files)
... or salted hash types instead of unsalted ones (if there are alternative -m modes available for that... |
|
philsmd |
hashcat
|
2 |
2,038 |
05-12-2018, 12:42 PM |
|
|
Thread: Hashcat 4.1.0 slow speed
Post: RE: Hashcat 4.1.0 slow speed
Are you sure that you are comparing the correct values?
Did you ran a benchmark (-b) with both versions?
There are a lot of people making the mistake to compare apples with oranges, for instance... |
|
philsmd |
hashcat
|
6 |
3,903 |
05-11-2018, 09:12 PM |
|
|
Thread: Hashcat piping doesn't work (WPA/2)
Post: RE: Hashcat piping doesn't work (WPA/2)
First of all, hccapx is the only hash format hashcat accepts since a long time for -m 2500 = WPA/WPA2 hashes. The hccap format is no more supported with latest versions of hashcat.
Your mask: "?l... |
|
philsmd |
User Contributions
|
4 |
6,411 |
05-11-2018, 03:48 PM |
|
|
Thread: Mask starting with a dash
Post: RE: Mask starting with a dash
The general rule for any command line tool using the (defacto) standard way of using arguments (getopts) is that the user needs to specify when the list of arguments is over and the remaining paramete... |
|
philsmd |
hashcat
|
4 |
3,494 |
05-08-2018, 07:17 PM |
|
|
Thread: Mask starting with a dash
Post: RE: Mask starting with a dash
I don't think this is a problem of hashcat, but this is how most command line tools work.
a dash is a special character and denotes the beginning of a command line parameter.
one dash introduces a s... |
|
philsmd |
hashcat
|
4 |
3,494 |
05-08-2018, 10:37 AM |
|
|
Thread: Help a total beginner: No usable dictionary file found.
Post: RE: Help a total beginner: No usable dictionary fi...
-a 6 is a hybrid attack mode, therefore you need to specify both the dictionary file and the mask
your command line should look something like this:
Code:
--
hashcat -a 6 -m 7700 hashes.txt dic... |
|
philsmd |
hashcat
|
2 |
2,335 |
05-03-2018, 07:13 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
if you use --hex-charset every character you specify must be specified in hexadecimal.
Therefore you must use:
Code:
--
hashcat64 -a 3 -m 0 -O --hex-charset -1 0a hash.txt 757365726e616d65?1?a?... |
|
philsmd |
hashcat
|
16 |
9,677 |
04-22-2018, 07:11 AM |