Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Line-length exception....
Post: RE: Line-length exception....
No. No. No.
I do not agree that the problem of cqdx has anything to do with what was original reported by the original reporter (OP). I do not agree that we should steal threads like this. I do not... |
|
philsmd |
hashcat
|
30 |
23,352 |
01-16-2018, 11:07 PM |
|
|
Thread: Electrum support - aes_decrypt (sha256 (sha256 ($pass), $data)
Post: RE: Electrum support - aes_decrypt (sha256 (sha25...
different salt type implies ("slightly") different algorithm (as far as I know)
The output of electrum2john will be different for different salt types.
I.e. $electrum$1 means that salt-type 1 is b... |
|
philsmd |
hashcat
|
32 |
25,733 |
02-03-2018, 01:34 PM |
|
|
Thread: Haschat cracked a password but how can I print out it?
Post: RE: Haschat cracked a password but how can I print...
It is explained for instance here: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
... |
|
philsmd |
hashcat
|
2 |
2,634 |
02-03-2018, 03:47 PM |
|
|
Thread: [mp64] Output Results with Max/Exact Number of Chars of Specified Charsets
Post: RE: [mp64] Output Results with Max/Exact Number of...
I think this is similar to what we do with policygen of PACK, i.e. using hashcat mask files (.hcmask) directly with hashcat. |
|
philsmd |
hashcat
|
2 |
2,649 |
02-06-2018, 08:38 AM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
It does. It looks if that specific process id found within the hashcat.pid file is still running.
Since tea-er's pid is strangely pid 5 (wtf ?) it might be the case that it always finds a pid with pi... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 08:53 PM |
|
|
Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...
In general (if we do not look at ethereum pre-sale) it's not always the case that only by having found the password corresponding to a certain hash you can access data of the owner of the hash (if no ... |
|
philsmd |
hashcat
|
4 |
3,766 |
01-20-2018, 10:58 PM |
|
|
Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password
maybe the document can be opened without problem and without password but there are other protections in place like copy/print protection etc. |
|
philsmd |
hashcat
|
10 |
8,001 |
02-08-2018, 06:49 PM |
|
|
Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat
does the example hash work for you?
are you sure you are using the correct hash type? you need to use -m 12700 |
|
philsmd |
hashcat
|
10 |
8,863 |
02-11-2018, 09:35 AM |
|
|
Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...
This discussion would also be interesting here: https://hashcat.net/forum/thread-6405-post-39256.html#pid39256
Basically, if you can reveal at least the last 2 blocks (2*16 bytes = 32 bytes) of the... |
|
philsmd |
hashcat
|
4 |
3,766 |
02-11-2018, 07:20 PM |
|
|
Thread: Hybrid Attack
Post: RE: Hybrid Attack
This is a warning. It is not an error message.
With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration. |
|
philsmd |
hashcat
|
3 |
3,011 |
02-12-2018, 10:48 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
it's not allowed to post hashes.
The encryption used by the PDF algorithm uses a 128 bit key.
This key is derived by a key-derivation-function and will be generated from your password as an inpu... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-12-2018, 10:51 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions).
Mask attack is in general not a good strategy to recover a password f... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-13-2018, 12:04 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
I'm not sure exactly what the problem is and why a second instance is still running.
Anyways, to solve it you just need to stop the second instance (either via job control - or "task manager"-like ... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 05:50 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
Please do one of the following actions:
1. after stopping your current running hashcat instance (the one with --session etc), delete the file "hashcat.pid" from the main hashcat folder
2. copy all y... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 08:41 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
You basically already answered your own question by explaining the algorithm details and linking to the algorithm description.
Furthermore, this question was already recently addressed within this fo... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-10-2018, 07:39 PM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the di... |
|
philsmd |
hashcat
|
6 |
5,814 |
02-15-2018, 10:30 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:49 PM |
|
|
Thread: WPA and first hash
Post: RE: WPA and first hash
https://hashcat.net/forum/thread-6355-post-33892.html#pid33892
https://github.com/hashcat/hashcat/issues/1167 |
|
philsmd |
hashcat
|
2 |
2,750 |
02-27-2018, 05:58 PM |
|
|
Thread: include SHA1 Hash with the results
Post: RE: include SHA1 Hash with the results
you can use --left to show all hashes that are not cracked yet and --show to show all hashes that are already cracked with the corresponding passwords (see: https://hashcat.net/wiki/doku.php?id=freque... |
|
philsmd |
hashcat
|
1 |
1,916 |
02-27-2018, 06:51 PM |