Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: [HELP] Hashcat Mask
Post: RE: [HELP] Hashcat Mask
That is just a hint how long WPA/WPA2 hashes could be in general (maximum allowed password length for WPA/WPA2).
For some hash types there are even 2 different kernel files (optimized vs pure). For... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,613 |
02-13-2018, 12:30 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions).
Mask attack is in general not a good strategy to recover a password f... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-13-2018, 12:04 PM |
|
|
Thread: [HELP] Hashcat Mask
Post: RE: [HELP] Hashcat Mask
for points 1 to 3 you could use maskprocessor. It supports the -q and -r command line arguments that filter out exactly the password candidates that do not match the policy that you described above.
... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,613 |
02-13-2018, 10:15 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
Well, there is no secret at all. The neo code is open source and even already linked above.
Here for instance is the verify function:
https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 10:08 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
it's not allowed to post hashes.
The encryption used by the PDF algorithm uses a 128 bit key.
This key is derived by a key-derivation-function and will be generated from your password as an inpu... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-12-2018, 10:51 PM |
|
|
Thread: Hybrid Attack
Post: RE: Hybrid Attack
This is a warning. It is not an error message.
With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration. |
|
philsmd |
hashcat
|
3 |
3,011 |
02-12-2018, 10:48 PM |
|
|
Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...
This discussion would also be interesting here: https://hashcat.net/forum/thread-6405-post-39256.html#pid39256
Basically, if you can reveal at least the last 2 blocks (2*16 bytes = 32 bytes) of the... |
|
philsmd |
hashcat
|
4 |
3,766 |
02-11-2018, 07:20 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Now, thinking about the padding attack... I think an alternative could work without revealing the whole encseed.
The thing is that the pre-sale algorithm uses padding (as already mentioned a couple... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 04:01 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:49 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
The algorithm doesn't allow to recover the whole seed (if it was really generated in a cryptographically secure random way) by just knowing some bytes (let's say 80) of the encrypted seed (furthermore... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:24 PM |
|
|
Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat
does the example hash work for you?
are you sure you are using the correct hash type? you need to use -m 12700 |
|
philsmd |
hashcat
|
10 |
8,863 |
02-11-2018, 09:35 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
You basically already answered your own question by explaining the algorithm details and linking to the algorithm description.
Furthermore, this question was already recently addressed within this fo... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-10-2018, 07:39 PM |
|
|
Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password
maybe the document can be opened without problem and without password but there are other protections in place like copy/print protection etc. |
|
philsmd |
hashcat
|
10 |
8,001 |
02-08-2018, 06:49 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
This type of attack makes no sense to me. You are basically just trying some combinations of the characters "0", "5", "7", "!" and "@" (together with --increment right?).
hashcat will generate passwo... |
|
philsmd |
General Talk
|
37 |
24,767 |
02-07-2018, 09:48 AM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
It does. It looks if that specific process id found within the hashcat.pid file is still running.
Since tea-er's pid is strangely pid 5 (wtf ?) it might be the case that it always finds a pid with pi... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 08:53 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
Please do one of the following actions:
1. after stopping your current running hashcat instance (the one with --session etc), delete the file "hashcat.pid" from the main hashcat folder
2. copy all y... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 08:41 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
I'm not sure exactly what the problem is and why a second instance is still running.
Anyways, to solve it you just need to stop the second instance (either via job control - or "task manager"-like ... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 05:50 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
I don't think that this mask would help or even be correct.
What -a 3 -1 charset --increment --increment-min 10 --increment-max 30
?1?1?1?1?1?1?1?1?1?1?1?1PASSWORD?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1... |
|
philsmd |
General Talk
|
37 |
24,767 |
02-06-2018, 05:31 PM |
|
|
Thread: [mp64] Output Results with Max/Exact Number of Chars of Specified Charsets
Post: RE: [mp64] Output Results with Max/Exact Number of...
I think this is similar to what we do with policygen of PACK, i.e. using hashcat mask files (.hcmask) directly with hashcat. |
|
philsmd |
hashcat
|
2 |
2,650 |
02-06-2018, 08:38 AM |