Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Hashcat don't parse sha256($pass.$salt) with --hex-salt
Post: RE: Hashcat don't parse sha256($pass.$salt) with -...
The newest beta version (https://hashcat.net/beta/) should fix this problem.
Thx for reporting |
|
philsmd |
hashcat
|
3 |
4,601 |
09-06-2017, 10:22 PM |
|
|
Thread: Hashcat aborting (bug?)
Post: RE: Hashcat aborting (bug?)
You should try again with the latest beta versions of hashcat (https://hashcat.net/beta/ , do not forget to use -O if you want to use the optimized kernels and have the same speed as with 3.6).
Rec... |
|
philsmd |
hashcat
|
2 |
2,942 |
09-05-2017, 02:01 PM |
|
|
Thread: Issues in cracking WPA2 with wordlist+mask
Post: RE: Issues in cracking WPA2 with wordlist+mask
The minimum password length for WPA/WPA2 is 8 bytes/characters.
Hashcat will immediately reject (see the Rejected.........: line within your status) all passwords which do not adhere to this limita... |
|
philsmd |
hashcat
|
1 |
3,201 |
09-04-2017, 10:45 AM |
|
|
Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash
As already mentioned above, the hash algorithm itself determines where/how the password candidates are generated for mask attacks (-a 3).
The hashcat source code distinguishes between ATTACK_EXEC_INS... |
|
philsmd |
hashcat
|
8 |
21,165 |
09-03-2017, 07:33 PM |
|
|
Thread: How to run the program to find a hash/Помогите запустить хешке
Post: RE: How to run the program to find a hash/Помо...
You can download the intel OpenCL CPU driver here: https://software.intel.com/en-us/articles/opencl-drivers#latest_CPU_runtime for your 430m CPU.
the GPU is way too old. |
|
philsmd |
hashcat
|
6 |
7,224 |
09-02-2017, 12:07 PM |
|
|
Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash
The short answer is: I/O
You shouldn't underestimate how slow it is to read from disk compared to e.g. generating the password candidates with rule/mask engine directly on GPU (fast hashes).
For slo... |
|
philsmd |
hashcat
|
8 |
21,165 |
09-02-2017, 08:40 AM |
|
|
Thread: Plain Vmware image setup - anyone?
Post: RE: Plain Vmware image setup - anyone?
I don't think that using a vmware image is an easy solution for your problem.
With virtualization you need the virtualization system to support having full access to your hardware (in this case the... |
|
philsmd |
hashcat
|
5 |
4,927 |
08-31-2017, 08:54 AM |
|
|
Thread: 1password agilebits conversion - doesn't match sample?
Post: RE: 1password agilebits conversion - doesn't match...
The format for hashcat is just:
decimal_iteration_count:hexadecimal_salt:hexadecimal_digest
you could just read the encryptionKeys.js file (and base64 convert the salt and digest) or use some othe... |
|
philsmd |
hashcat
|
3 |
3,947 |
08-30-2017, 06:27 PM |
|
|
Thread: Office and --show option
Post: RE: Office and --show option
If you want to output the cracked hashes with -m 9820 you need to use the orginal hash file that you use to crack with -m 9820 (this is not only true for -m 9820, but for all hash types).
So if you... |
|
philsmd |
hashcat
|
6 |
5,802 |
08-28-2017, 07:26 AM |
|
|
Thread: 15200 Blockchain, My Wallet, V2 help
Post: RE: 15200 Blockchain, My Wallet, V2 help
Use this python script to extract the "hash" from your wallet file:
https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/blockchain2john.py
Don't forget to either remove... |
|
philsmd |
hashcat
|
1 |
3,046 |
08-26-2017, 07:38 AM |
|
|
Thread: hashcat stops after about 37 minutes
Post: RE: hashcat stops after about 37 minutes
Hey @patpro. Thank you for the report.
It seems devs now were able to reproduce this problem and fix it (https://github.com/hashcat/hashcat/commit/688a580d6c8c29b2525d905cb4ae1b688fc8fba7). Please ... |
|
philsmd |
hashcat
|
22 |
17,111 |
08-25-2017, 08:56 PM |
|
|
Thread: A good hash ???
Post: RE: A good hash ???
We already explained this to you here:
https://hashcat.net/forum/thread-6609-post-36090.html#pid36090
axcrypt2john.py includes the file name and hashcat doesn't need that.
either use --username o... |
|
philsmd |
hashcat
|
1 |
2,126 |
08-25-2017, 08:52 PM |
|
|
Thread: --limit and --skip usage
Post: RE: --limit and --skip usage
your examples above have 2 different masks:
you used ?l?l?l?l?l?l?l?l for the keyspace calculation and ?l?l?l?l?l?l?l? for the actual run.
You should always use the same mask!
Furthermore, yo... |
|
philsmd |
hashcat
|
2 |
2,896 |
08-25-2017, 12:24 PM |
|
|
Thread: Office and --show option
Post: RE: Office and --show option
The problem should be fixed with newest beta version: https://hashcat.net/beta/
The output of --show should now be correct (remember: you need to use the correct -m modes i.e. 9810 and not 9800, ot... |
|
philsmd |
hashcat
|
6 |
5,802 |
08-25-2017, 10:11 AM |
|
|
Thread: Office and --show option
Post: RE: Office and --show option
You forgot to also include the command you execute for -m 9820.
It also must contaiin the --username switch.
It probably should be without "$HEX[" and "]''. could be indeed a bug but from your out... |
|
philsmd |
hashcat
|
6 |
5,802 |
08-25-2017, 07:12 AM |
|
|
Thread: ERROR: Use of -r/--rules-file and -g/--rules-generate only allowed in attack mode 0.
Post: RE: ERROR: Use of -r/--rules-file and -g/--rules-g...
Within this video hashcat-legacy (https://github.com/hashcat/hashcat-legacy) is being used and not the new hashcat.
Yeah, 2 of the differences we notice here between hashcat-legacy and hashcat is t... |
|
philsmd |
hashcat
|
4 |
4,702 |
08-24-2017, 08:46 PM |
|
|
Thread: ERROR: Use of -r/--rules-file and -g/--rules-generate only allowed in attack mode 0.
Post: RE: ERROR: Use of -r/--rules-file and -g/--rules-g...
you need to use -a 0 to use --rules-file (or short -r). The same is true for --rules-generate (or short -g), it is only supported with straight/dictionary attack (-a 0). |
|
philsmd |
hashcat
|
4 |
4,702 |
08-24-2017, 08:23 PM |
|
|
Thread: hashcat stops after about 37 minutes
Post: RE: hashcat stops after about 37 minutes
https://hashcat.net/beta/ |
|
philsmd |
hashcat
|
22 |
17,111 |
08-23-2017, 08:01 PM |
|
|
Thread: multi charset
Post: RE: multi charset
1. it's not allowed to post hashes
2. you need to specify a mask (see https://hashcat.net/wiki/?id=mask_attack) if you use -a 3 (otherwise the default one will be used, which is probably not exactly ... |
|
philsmd |
hashcat
|
3 |
4,680 |
08-23-2017, 03:15 PM |
|
|
Thread: Scrypt + Salsa20/8 128 128
Post: RE: Scrypt + Salsa20/8 128 128
I just did several test with scrypt (even the "pleaseletmein" test) and I found no problem cracking scrypt with hashcat.
Could you please be more specific. What do you mean by "still unable to crac... |
|
philsmd |
hashcat
|
7 |
8,171 |
08-23-2017, 08:37 AM |