Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax
Are you sure you are using the latest version of hashcat?
What do you mean by too long? How long is your salt ? |
|
philsmd |
hashcat
|
10 |
6,738 |
03-29-2018, 04:29 PM |
|
|
Thread: "If you specify a custom charset, you must also specify a mask."
Post: RE: "If you specify a custom charset, you must als...
It's important to understand how your command line interpreter/shell works and what characters are special.
You can use a charset file and put your custom charset within the .hcchr file.
Alternative... |
|
philsmd |
hashcat
|
3 |
6,214 |
04-12-2018, 04:24 PM |
|
|
Thread: 7z password recovery
Post: RE: 7z password recovery
Do you see the list of files or was the file list also encrypted?
I think the "Out of memory!" message comes because the 7z2hashcat requires a little bit of RAM to fit the whole encrypted data with... |
|
philsmd |
hashcat
|
7 |
8,537 |
04-19-2018, 07:30 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
I just had a glance at how easy it is to decrypt office document with the old RC4 encryption (and therefore get access to the whole file content) with the correct RC4 key and it turned out to be even ... |
|
philsmd |
hashcat
|
13 |
10,132 |
02-27-2018, 07:16 PM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
How do you know that it doesn't duplicate whenever the length is greater than 15? How did you test it?
if I run something like this:
Code:
--
echo abcdefghijklmnopqrstuvwxyz | hashcat --stdout ... |
|
philsmd |
hashcat
|
8 |
6,282 |
03-02-2018, 10:14 AM |
|
|
Thread: OpenCL ERROR
Post: RE: OpenCL ERROR
Your specific Intel GPU model doesn't support OpenCL. Hashcat requires that the hardware supports OpenCL.
You can just look at the support page of intel.
For instance here: https://software.intel.co... |
|
philsmd |
hashcat
|
5 |
4,947 |
03-04-2018, 10:01 AM |
|
|
Thread: Help a total beginner: No usable dictionary file found.
Post: RE: Help a total beginner: No usable dictionary fi...
-a 6 is a hybrid attack mode, therefore you need to specify both the dictionary file and the mask
your command line should look something like this:
Code:
--
hashcat -a 6 -m 7700 hashes.txt dic... |
|
philsmd |
hashcat
|
2 |
2,335 |
05-03-2018, 07:13 PM |
|
|
Thread: Mask starting with a dash
Post: RE: Mask starting with a dash
The general rule for any command line tool using the (defacto) standard way of using arguments (getopts) is that the user needs to specify when the list of arguments is over and the remaining paramete... |
|
philsmd |
hashcat
|
4 |
3,494 |
05-08-2018, 07:17 PM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
Just to make sure that other users interested in something like this do not choose a wrong approach to do these types of attacks: if you are cracking a "salted" hash, you should use the corresponding ... |
|
philsmd |
hashcat
|
7 |
5,472 |
03-18-2018, 07:46 PM |
|
|
Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys
but what does this tell us? I think kind of no news here.
It just means that I/O should be avoided and could always be a bottleneck (even if you use /dev/null and the /dev/null is highly optimized by... |
|
philsmd |
hashcat
|
3 |
3,323 |
03-19-2018, 09:22 AM |
|
|
Thread: 7Zip Hash, missing SALT? (Salt-value exception)
Post: RE: 7Zip Hash, missing SALT? (Salt-value exception...
yeah, change it back to 1
and change 09, 10 and 11 to the values that are for instance used by the example hash:
$112$98$f3bc2a88062c419a25acd40c0c2d75421cf23263f69c51b13f9b1aada41a8a09f9adeae45d6... |
|
philsmd |
hashcat
|
14 |
10,239 |
03-19-2018, 11:07 PM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
you can restore a session by moving into the correct directory and running just this command:
Code:
--
hashcat --restore
--
you do not need (and are not allowed) to add many further arguments ... |
|
philsmd |
hashcat
|
5 |
4,141 |
03-20-2018, 01:38 PM |
|
|
Thread: how can I set the mask to a md5 hash result of itself?
Post: RE: how can I set the mask to a md5 hash result of...
You are using the wrong hash mode. You need to use this one:
-m 3710 = md5($salt.md5($pass))
(Note: if you know the original password and are looking for the salt, you need to switch the role of t... |
|
philsmd |
hashcat
|
5 |
3,576 |
04-01-2018, 10:12 AM |
|
|
Thread: My Itunes hash
Post: RE: My Itunes hash
I must admit that I didn't understand at all what you mean by this x+1 and x+2, y etc... but I would recommend that you just read the documentation on how to use hashcat mask files (.hcmask):
1. http... |
|
philsmd |
hashcat
|
3 |
3,719 |
04-02-2018, 10:13 AM |
|
|
Thread: Hashcat 4.1.0 slow speed
Post: RE: Hashcat 4.1.0 slow speed
Are you sure that you are comparing the correct values?
Did you ran a benchmark (-b) with both versions?
There are a lot of people making the mistake to compare apples with oranges, for instance... |
|
philsmd |
hashcat
|
6 |
3,903 |
05-11-2018, 09:12 PM |
|
|
Thread: need help ( paid )
Post: RE: need help ( paid )
yeah, I agree. It's also against the spirit of this forum. we are willing to explain and teach you how to use hashcat if you are willing to invest some time and brain power into it... you need to be o... |
|
philsmd |
hashcat
|
4 |
3,523 |
04-14-2018, 11:40 AM |
|
|
Thread: appending numbers to combo attack
Post: RE: appending numbers to combo attack
I agree with undeath (like always ?) ... and would like to suggest that depending on how small your word lists are etc, you could also think of an alternative like this:
1. first precompute and store... |
|
philsmd |
hashcat
|
3 |
6,267 |
04-14-2018, 03:24 PM |
|
|
Thread: 7z password recovery
Post: RE: 7z password recovery
What are the sizes of the hashes we are talking about here? How large is the resulting hash size given/displayed by 7z2hashcat ?
Furthermore, if the password is completely random you will really ha... |
|
philsmd |
hashcat
|
7 |
8,537 |
04-15-2018, 08:34 AM |
|
|
Thread: Increment knowing the last chars of password
Post: RE: Increment knowing the last chars of password
... or hashcat mask files (https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files)
... or salted hash types instead of unsalted ones (if there are alternative -m modes available for that... |
|
philsmd |
hashcat
|
2 |
2,038 |
05-12-2018, 12:42 PM |
|
|
Thread: Solution to use very large wordlist
Post: RE: Solution to use very large wordlist
What is the hash type ? -m ?
For instance -m 2500 = WPA/WPA2 has a minimum password length of 8 characters
You should also think if it is possible to replace the huge file with a more clever str... |
|
philsmd |
hashcat
|
4 |
3,817 |
05-12-2018, 03:41 PM |