Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Getting a Hash Via DD From a VeraCrypt File
Post: RE: Getting a Hash Via DD From a VeraCrypt File
... if you are using crunch together with hashcat you are probably doing something wrong (well, this might not always be the case, but most of the time for new users!)
hashcat has all the attack mode... |
|
philsmd |
hashcat
|
4 |
5,595 |
03-30-2017, 12:21 PM |
|
|
Thread: Literal word, characters any case
Post: RE: Literal word, characters any case
Actually there are different ways to accomplish this and the strategy you choose depends heavily on how many hashes/salts you have and on the type of hashes (the examples are for -m 0 = MD5 below):
... |
|
philsmd |
hashcat
|
2 |
2,558 |
03-30-2017, 08:12 AM |
|
|
Thread: how to run hashcat in a distributed environment
Post: RE: how to run hashcat in a distributed environmen...
1.
Code:
--
hashcat --keyspace -a 3 ?a?a?a?a?a?a?a
81450625
--
2.
Code:
--
81450625 / 10 = 8145063
--
3.
Code:
--
hashcat -m 0 -a 3 -w 4 --skip 0 --limit 8145063 hash_file.txt ?a?a?a?... |
|
philsmd |
hashcat
|
3 |
5,662 |
03-30-2017, 09:15 AM |
|
|
Thread: Limit to distribute
Post: RE: Limit to distribute
This is a known issue of the current release version (3.40): see https://github.com/hashcat/hashcat/issues/1153
You could use the beta version which includes the fix (https://hashcat.net/beta/) or ... |
|
philsmd |
hashcat
|
4 |
3,997 |
03-30-2017, 07:42 PM |
|
|
Thread: 1Password with 15/16 characters - *most likely* known - how to start?
Post: RE: 1Password with 15/16 characters - *most likely...
welcome.
The hashcat documentation is here: https://hashcat.net/wiki/ and/or https://hashcat.net/faq/
1. you can use 1password2john.py (https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bl... |
|
philsmd |
hashcat
|
3 |
3,958 |
03-30-2017, 07:47 PM |
|
|
Thread: Solved WPA2 Hash - but Password won't work
Post: RE: Solved WPA2 Hash - but Password won't work
I think it is much more likely that there are some further security measurements (like MAC address filtering) or that you type/input the password incorrectly (wrong configuration/setting/HEX vs presha... |
|
philsmd |
hashcat
|
4 |
5,190 |
03-31-2017, 08:53 AM |
|
|
Thread: distributed cracking: relation between -s/-l value and Restore.Point value when cracked
Post: RE: how to run hashcat in a distributed environmen...
You shouldn't make this type of connection between -s/-l value and the value you see at the time the hashes were cracked in the Restore.Point line (there are additional features that might influence i... |
|
philsmd |
hashcat
|
6 |
5,686 |
03-31-2017, 09:21 AM |
|
|
Thread: Encrypted TimeMachine external backup disk
Post: RE: Encrypted TimeMachine external backup disk
I am not really familiar with these TimeMachine backups, but I assume that whenever you have a Manifest.plist file (does that file ship with the backup?) and itunes_backup2hashcat.pl extracted some "h... |
|
philsmd |
hashcat
|
5 |
6,174 |
04-01-2017, 08:11 AM |
|
|
Thread: Which way is faster
Post: RE: Which way is faster
|
philsmd |
hashcat
|
7 |
9,226 |
04-02-2017, 04:01 PM |
|
|
Thread: Which way is faster
Post: RE: Which way is faster
Well, the following facts should be very obvious but maybe you are asking for them:
- if the dictionary is very small and dedicated a word list attack (-a 0) would be smarter/better
- if a dictionary ... |
|
philsmd |
hashcat
|
7 |
9,226 |
04-02-2017, 03:02 PM |
|
|
Thread: Help with partial known simple OS X password
Post: RE: Help with partial known simple OS X password
-a 3 is for mask attack (https://hashcat.net/wiki/mask_attack), if you want to use a wordlist, you need to use -a 0
I'm not sure what D:\cracked.txt or [path to cracked.txt] mean in your example. I... |
|
philsmd |
hashcat
|
6 |
6,006 |
04-03-2017, 05:51 PM |
|
|
Thread: Help with partial known simple OS X password
Post: RE: Help with partial known simple OS X password
I didn't say you shoud use "- o" (minus space lower-case o), but "-o file".
That's a huge difference.
Furthermore, this "-1 xyz?d?d?d?d" is totally wrong. What should this do in your opinion?
--cust... |
|
philsmd |
hashcat
|
6 |
6,006 |
04-03-2017, 09:03 PM |
|
|
Thread: I want to brute force incrementally with two digits appended
Post: RE: I want to brute force incrementally with two d...
You can use a .hcmask file for this (https://hashcat.net/wiki/mask_attack#hashcat_mask_files):
Code:
--
hashcat -m 0 -a 3 hash_file.txt mask_file.hcmask
--
content of the file "mask_file.hcmas... |
|
philsmd |
hashcat
|
1 |
2,173 |
04-04-2017, 06:55 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, in this very specific situation it might be best to have a fast (standalone) password generator (a c file, perl script etc which only generates passwords according to your "rules").
According t... |
|
philsmd |
hashcat
|
26 |
24,603 |
04-08-2017, 09:32 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
@dindolo1979 Attention: I would be very careful with this small set of information you provided/got here.
As far as I understood the algorithm is much more simple/straight forward and doesn't need an... |
|
philsmd |
hashcat
|
26 |
24,603 |
04-07-2017, 02:03 PM |
|
|
Thread: WPA2 Cracking With Password Less Then 8 Length Using rule Attack
Post: RE: WPA2 Cracking With Password Less Then 8 Length...
It seems that you also opened a hashcat github issue (https://github.com/hashcat/hashcat/issues/1222#issuecomment-292860873) and it was answered and closed.
Please do not hesitate to use the forum se... |
|
philsmd |
hashcat
|
1 |
2,947 |
04-10-2017, 09:41 AM |
|
|
Thread: Help me to crack those hashes please
Post: RE: Help me to crack those hashes please
banned (1 week, use it wisely to read and understand the forum rules) and thread closed |
|
philsmd |
hashcat
|
2 |
2,628 |
04-10-2017, 02:55 PM |
|
|
Thread: Proper meaning of status codes?
Post: RE: Proper meaning of status codes?
-2 whenever the temperature limit was reached
-1 in case of errors (arguments or other inputs - also input files etc)
2 in case the 'q' key was hit
3 in case the 'c' key was hit (checkpoint quit f... |
|
philsmd |
hashcat
|
2 |
3,339 |
04-12-2017, 08:31 AM |
|
|
Thread: Keepass 1.x issue
Post: RE: Keepass 1.x issue
Example hashes can be found here: https://hashcat.net/example_hashes
Make sure that the format is the same, e.g. it starts with $keepass$*
If you want to prepend the username (or file name) then y... |
|
philsmd |
hashcat
|
2 |
3,985 |
04-18-2017, 09:21 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
If you are sure that the algorithm is:
md5_hex(md5($salt) . md5_hex($pass))
... where md5 (x) is the binary/raw output and md5_hex (y) is the hexadecimal output...
then it should work.
just try it... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-12-2017, 09:17 AM |