Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: WPA speed drop between 0.15 and 1.01
Post: RE: WPA speed drop between 0.15 and 1.01
The screenshot of oclHashcat 1.01 shows that you are trying to crack more than one network (.hccap file w/ several essid - note the file size of the hccap file + "Recovered......: 0/10"). That's also ... |
|
philsmd |
Old oclHashcat Support
|
9 |
18,769 |
01-07-2014, 07:42 AM |
|
|
Thread: Brutforce too slow? / Increment-Problems [Solved]
Post: RE: Brutforce too slow?
and you should use -u 4096 -n 32 for optimal speed (not -u 32) |
|
philsmd |
Old oclHashcat Support
|
9 |
29,021 |
01-07-2014, 11:43 PM |
|
|
Thread: multi.hccap miss password and benchmark -m 3200 display driver stopped responding
Post: RE: multi.hccap miss password and benchmark -m 320...
Hey and thx for your testing and the report.
I don't really like to discuss 2+ different problems within the same thread....
Anyway,
1. please open a trac ticket https://hashcat.net/trac/ with a se... |
|
philsmd |
Old oclHashcat Support
|
3 |
10,337 |
12-12-2013, 02:23 PM |
|
|
Thread: Error on Ubuntu: Nvdia
Post: RE: Error on Ubuntu: Nvdia
So the answer is, you need to:
1. make sure you use the latest oclHashcat version (1.01 currently)
2. your system uses a supported driver, see https://hashcat.net/oclhashcat/, it clearly says: NV use... |
|
philsmd |
Old oclHashcat Support
|
4 |
10,370 |
01-08-2014, 12:57 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: RE: OS X Bug ? Or.. ?
remember, we talk about salted hashes (that's why different salt - but same pass - => different hash)
The first 8 characters is the salt string of those OSX hashes |
|
philsmd |
Old oclHashcat Support
|
4 |
7,195 |
01-10-2014, 11:55 PM |
|
|
Thread: reuse restore file after upgrade (was oclHashcat v1.01)
Post: RE: oclHashcat v1.01
As far as I know, (by accident) for the next version of oclHashcat, there is a new feature that will "upgrade" your .restore file when it detects that the restore file could still be used (if nothing ... |
|
philsmd |
Old oclHashcat Support
|
6 |
14,057 |
01-04-2014, 12:03 PM |
|
|
Thread: v1.01 combination attack
Post: RE: v1.01 combination attack
As "User" said you need to specify exactly 2 dictionaries for instance:
Code:
--
./cudaHashcat64.bin -m 0 -a 1 -o output.txt hash.txt dict1.txt dict2.txt
--
Therefore, if you use -o outfi... |
|
philsmd |
Old oclHashcat Support
|
4 |
8,449 |
01-18-2014, 12:03 AM |
|
|
Thread: oclHashcat v1.02 going for distributed cracking
Post: RE: oclHashcat v1.02 going for distributed crackin...
Thx atom.
This is a very amazing feature.
I want to add 1 technical detail:
whenever you use -s / -l in combination w/ maskfiles / directories... the offsets / values will apply to the first mask / f... |
|
philsmd |
Old oclHashcat Support
|
4 |
22,153 |
01-19-2014, 01:10 AM |
|
|
Thread: Segmentation Fault
Post: RE: Segmentation Fault
We need more details to help you w/ this problem...
Required information:
1. operating system details (version of linux, kernel version - uname -a, 32/64 bit etc)
2. did it work before (w/ this setup)... |
|
philsmd |
Old oclHashcat Support
|
3 |
10,324 |
01-05-2014, 05:07 PM |
|
|
Thread: reuse restore file after upgrade (was oclHashcat v1.01)
Post: RE: reuse restore file after oclHashcat upgrade (w...
The problem is that when you are running some (mingw etc) shell commands, you need to know what they do...
For example, if you want to modify the file "att5.restore" then you shouldn't touch the "oclH... |
|
philsmd |
Old oclHashcat Support
|
6 |
14,057 |
01-06-2014, 12:07 PM |
|
|
Thread: multi hccap crack
Post: RE: multi hccap crack
The multi-hccap support is explained here: https://hashcat.net/wiki/doku.php?id=hccap
Note: for performance reasons you cannot mix wpa2 and wpa (also see https://hashcat.net/trac/ticket/222#comment:4 ... |
|
philsmd |
Old oclHashcat Support
|
1 |
7,754 |
01-20-2014, 08:34 PM |
|
|
Thread: .cap conversion fails
Post: RE: .cap conversion fails
Please double-check if you did all the steps mentioned here: https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2
For wpa you need to add -m 2500 to the command line: see https://hashcat.net/wiki/d... |
|
philsmd |
Old oclHashcat Support
|
2 |
7,204 |
01-21-2014, 12:31 PM |
|
|
Thread: weird mask attack
Post: RE: weird mask attack
There is something strange in your output, for instance it says it uses the hashes located at ../hash/mysql/mysql_hash.txt but your command line says it should use the file mysql_hash.txt in the curre... |
|
philsmd |
Old oclHashcat Support
|
4 |
10,190 |
01-08-2014, 05:56 PM |
|
|
Thread: 10 digit mask increments
Post: RE: 10 digit mask increments
You may be able to understand how this mask-based word generation works by looking at either the output of cpu hashcat --stdout OR maskprocessor.
It's easier to understand it (in my opinion) by see... |
|
philsmd |
Old oclHashcat Support
|
3 |
7,695 |
02-03-2014, 11:33 AM |
|
|
Thread: IPMI2 RAKP HMAC-SHA1 oclHashcat Support?
Post: RE: IPMI2 RAKP HMAC-SHA1 oclHashcat Support?
There is already an open trac request (see: https://hashcat.net/trac/ticket/233 - but not yet accepted)... if devs see that there is much interest for this new algo in oclHashcat they may prioritize i... |
|
philsmd |
Old oclHashcat Support
|
2 |
8,925 |
02-04-2014, 02:26 PM |
|
|
Thread: oclHashcat will not run via SSH
Post: RE: oclHashcat will not run via SSH
You should check if you did everything like described in the howto installation guide: https://hashcat.net/wiki/doku.php?id=linux_server_howto
The main problem might be that you didn't run:
$ xhos... |
|
philsmd |
Old oclHashcat Support
|
2 |
6,314 |
02-07-2014, 04:13 PM |
|
|
Thread: weird mask attack
Post: RE: weird mask attack
These lines:
Code:
--
$HASHCAT -a 3 -m 300 --remove --status --gpu-temp-retain=95 \
../hash/mysql/mysql_hash.txt -o ../hash/mysql/mysql_hash_result.txt
../oclHashcat-1.01/masks/rockyou-1-64.hc... |
|
philsmd |
Old oclHashcat Support
|
4 |
10,190 |
01-09-2014, 05:22 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: RE: OS X Bug ? Or.. ?
the password for this hash is the empty string, ""
the double colon says this (nothing between the colons means empty string)
the LF is also correct at the end, otherwise the next cracked hash:passwor... |
|
philsmd |
Old oclHashcat Support
|
4 |
7,195 |
01-10-2014, 04:57 PM |
|
|
Thread: About exclude symbol
Post: RE: About exclude symbol
If I understood this correctly, I think there is a way to remove the already checked keyspace.
I think mathematically one would say there is an intersection between ?l?u?d and ?l?d and the new set of... |
|
philsmd |
Old oclHashcat Support
|
4 |
8,152 |
01-20-2014, 02:51 PM |
|
|
Thread: Benchmark K10 and Rejected hash
Post: RE: Benchmark K10 and Rejected hash
You have 1147 distinct salts, therefore the speed is divided by 1147 (since each word must be combined w/ those 1147 salts, roughlty speaking).
112.7 kH/s * 1147 = 128.464 MH/s
Descrypt passwords ... |
|
philsmd |
Old oclHashcat Support
|
2 |
7,368 |
02-11-2014, 08:22 PM |