Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
That's actually really fast for such a huge keyspace.
For instance, if you have 10 GPUs, it would only take you a single year (if we assume the worst case. 6 month on average)!
Again, brute-force ... |
|
philsmd |
General Talk
|
8 |
7,222 |
01-05-2018, 10:28 AM |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
no. You can't use the wallet.dat file directly. You need to download bitcoin2john.py (from https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/bitcoin2john.py) and run it w... |
|
philsmd |
General Talk
|
8 |
7,222 |
01-04-2018, 09:05 PM |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
no, I don't think that a mask attack with a charset of ?a in each position is a good strategy.
Since -m 11300 is a slow hashing algorithm I would recommend to remember as much as possible from the ... |
|
philsmd |
General Talk
|
8 |
7,222 |
01-05-2018, 09:37 AM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
Well, the best strategy depends on a couple of things like:
1. is it a slow or fast hashing algorithm (which hash type is used, -m ?) ?
2. how large is the number of constant strings. Is there only ... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-09-2018, 09:40 AM |
|
|
Thread: ssha help
Post: RE: ssha help
Example hashes can be found here: https://hashcat.net/wiki/doku.php?id=example_hashes
... and yes only -m 111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA looks similar (has the, what we call, same ... |
|
philsmd |
General Talk
|
5 |
4,090 |
01-10-2018, 02:00 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
your syntax is not correct, --custom-charset2 (or short -2) is used to define a charset. You can't specify a dictionary file with -2, it only accepts a set of different chars at the first line of the ... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-09-2018, 06:43 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
Hashcat makes a strict distinction between rules (see https://hashcat.net/wiki/doku.php?id=rule_based_attack) and masks (https://hashcat.net/wiki/doku.php?id=mask_attack).
solace is currently using... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-15-2018, 11:49 PM |
|
|
Thread: Hashtopussy Mask Attack
Post: RE: Hashtopussy Mask Attack
The problem is that this is not the hashtopussy forum.
Hashtopussy is a 3rd party software. You are asking your question at the wrong place
You should try to find the answers to your questions by ... |
|
philsmd |
General Talk
|
2 |
2,466 |
02-03-2018, 09:10 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
It doesn't look too bad.
but there are at least 2 things that I don't understand:
1. why do you define --custom-charset1 with EFBBBF and only use it at 1 position (this means that hashcat will test ... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-26-2018, 11:30 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
It doesn't look correct to me.
As I already wrote above, the hex 12 (which is decimal 18) and hex 13 (which is decimal 19) do not look correct.
You even write:
Code:
--
?1 = 101213 = Carriage R... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-27-2018, 08:59 AM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
In general you do this mangling (like appending/prepending characters etc) with rule based attacks (with -a 0 and -r my.rule for instance), i.e. you run a wordlist and add those special characters and... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-26-2018, 09:00 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
I don't think that this mask would help or even be correct.
What -a 3 -1 charset --increment --increment-min 10 --increment-max 30
?1?1?1?1?1?1?1?1?1?1?1?1PASSWORD?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1... |
|
philsmd |
General Talk
|
37 |
24,766 |
02-06-2018, 05:31 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
This type of attack makes no sense to me. You are basically just trying some combinations of the characters "0", "5", "7", "!" and "@" (together with --increment right?).
hashcat will generate passwo... |
|
philsmd |
General Talk
|
37 |
24,766 |
02-07-2018, 09:48 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
If you run hashcat --help (with the latest version of hashcat) you will see that 2501 is supported and within the output.
you can use hcxtools from https://github.com/ZerBea/hcxtools (wlancap2hcx -... |
|
philsmd |
General Talk
|
20 |
19,682 |
03-02-2018, 10:03 AM |
|
|
Thread: Help for rule
Post: RE: Help for rule
Code:
--
hashcat --stdout -a 3 -1 ?l?d?u "^?1 ^?1"
--
|
|
philsmd |
General Talk
|
10 |
6,459 |
07-07-2018, 08:17 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack
Code:
--
hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u
--
|
|
philsmd |
General Talk
|
12 |
8,560 |
07-25-2018, 07:27 PM |
|
|
Thread: No duplicated characters when cracking wpa2 password
Post: RE: No duplicated characters when cracking wpa2 pa...
you also can't really pipe like this:
command1 | cd && command2
you need to do it like this:
command1 | command2
therefore something like this:
Code:
--
cd C:\Users\Alexandre\Downloads\h... |
|
philsmd |
General Talk
|
7 |
5,192 |
09-29-2018, 11:50 AM |
|
|
Thread: No duplicated characters when cracking wpa2 password
Post: RE: No duplicated characters when cracking wpa2 pa...
the command I told you to use was different:
1. enter the hashcat folder within the cmd:
Code:
--
cd C:\Users\Alexandre\Downloads\hashcat-4.2.1\
--
2. afterwards run hashcat within that speci... |
|
philsmd |
General Talk
|
7 |
5,192 |
09-30-2018, 10:46 AM |
|
|
Thread: Unified list manager
Post: RE: Unified list manager
use hashcat in-built --show mechanism instead.
Code:
--
hashcat -m 0 --show --outfile-format 2 hashes.txt
--
this other tool "Unitifed list manager" is a 3th party tool and we don't give sup... |
|
philsmd |
General Talk
|
1 |
1,775 |
11-19-2018, 10:49 PM |
|
|
Thread: Correct way to hash and crack PMKID and benchmark
Post: RE: Correct way to hash and crack PMKID and benchm...
I think there are a lot of misunderstandings here.
I would highly recommend that you re-read this thread again: https://hashcat.net/forum/thread-7717.html
of course -m 16800 = WPA-PMKID-PBKDF2 i... |
|
philsmd |
General Talk
|
1 |
5,147 |
01-30-2019, 02:01 PM |