Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Dictiionary Attack - how-to-question
Post: RE: Dictiionary Attack - how-to-question
It's not totally clear. maybe this is only a problem on macOS ? do you use the latest version of macOS ?
It could easily be that the macOS driver is buggy. You could do further test and see if other ... |
|
philsmd |
General Talk
|
29 |
5,284 |
04-22-2020, 02:13 PM |
|
|
Thread: Dictiionary Attack - how-to-question
Post: RE: Dictiionary Attack - how-to-question
In general you would use a command like this:
Code:
--
hashcat -m 14700 -a 3 -w 3 --increment --increment-min 8 -2 ?u?l?d@ extracted_hash.txt ?u?2?2?2?2?2?2?2?2?2
--
instead of -2 you could al... |
|
philsmd |
General Talk
|
29 |
5,284 |
04-23-2020, 12:17 PM |
|
|
Thread: Dictiionary Attack - how-to-question
Post: RE: Dictiionary Attack - how-to-question
-w is for the workload profile, see the output of the hashcat --help command:
Code:
--
hashcat --help
...
- [ Workload Profiles ] -
# | Performance | Runtime | Power Consumption | Desktop I... |
|
philsmd |
General Talk
|
29 |
5,284 |
04-23-2020, 05:59 PM |
|
|
Thread: Dictiionary Attack - how-to-question
Post: RE: Dictiionary Attack - how-to-question
glad to hear that. well done ! |
|
philsmd |
General Talk
|
29 |
5,284 |
04-28-2020, 02:01 PM |
|
|
Thread: Searching guys with many GPU
Post: RE: Searching guys with many GPU
Well, I don't think it's really against the rule but:
1. you might reach much more people who could be interested in these strange "jobs" by using other forums like https://forum.hashkiller.io/index.... |
|
philsmd |
General Talk
|
2 |
1,180 |
04-30-2020, 12:41 PM |
|
|
Thread: Hashcat RAM usage
Post: RE: Hashcat RAM usage
we need more details of course:
- full command (without posting hashes of course)
- system details (CPU, GPU make/model)
- do you see the hashcat process in the task manager ? try only inspecting... |
|
philsmd |
General Talk
|
3 |
1,209 |
05-09-2020, 11:46 AM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
the hashcat way of storing mask is hashcat mask files (hcmask):
https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
my.hcmask:
Code:
--
123456789,?d-,abcdABCD?d,?3-,?1?2?4?3?3?... |
|
philsmd |
General Talk
|
8 |
2,070 |
05-29-2020, 09:24 PM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
for these numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25
you could just write several different mask like this:
Code:
--
123456789,?1
1?d
0123... |
|
philsmd |
General Talk
|
8 |
2,070 |
05-30-2020, 07:30 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
yeah, in the help output:
Code:
--
hashcat --help
--
you will see all the TrueCrypt hash types (several variants depending on bit length and hash used + variants for boot volumes)
BTW: the ... |
|
philsmd |
General Talk
|
10 |
2,590 |
05-31-2020, 08:46 AM |
|
|
Thread: Password-based Uniform-Random-Equivalent Encryption
Post: RE: Password-based Uniform-Random-Equivalent Encry...
it wouldn't be surprising that there exists software that can encrypt disks/volumes/containers etc and make them look as random data.
The problem only is that also (plain text and easy to spot) metad... |
|
philsmd |
General Talk
|
1 |
557 |
06-13-2020, 03:45 PM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
just one simple thing you could and should do. create a similar container with known password (it could be similar to the one you are trying to crack, just remember always that this is just a test and... |
|
philsmd |
General Talk
|
10 |
2,590 |
06-15-2020, 08:52 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
What do you mean by "I'm now able to run the attack" ?
Are you able to crack hashes that you have generated as a test ? Did you try to crack the example hash from https://hashcat.net/wiki/example_h... |
|
philsmd |
General Talk
|
10 |
2,590 |
06-18-2020, 12:50 PM |
|
|
Thread: Rules in 16800 don't work?
Post: RE: Rules in 16800 don't work?
it's exactly like undeath explained above.
Without the -S slow mode the passwords that are too short (from the dict) are rejected immediately, while the -S mode is slow because it mangles the words w... |
|
philsmd |
General Talk
|
8 |
1,341 |
06-30-2020, 11:10 AM |
|
|
Thread: compiling a reduced wordlist .ccp
Post: RE: compiling a reduced wordlist .ccp
some answers already given here: https://hashcat.net/forum/thread-6170-post-49424.html#pid49424
Maybe it's better to just explain what you ultimate goal is ?
Does it even have to do with WPA2 ha... |
|
philsmd |
General Talk
|
2 |
659 |
07-03-2020, 10:28 AM |
|
|
Thread: How to go about a password you know has 3 - 5 more or less known words?
Post: RE: How to go about a password you know has 3 - 5 ...
different topic, off-topic
hint: encoding. UTF8 character encoding is supported by default, but all hashing algorithms work with bytes (0x00-0xff) anyways. |
|
philsmd |
General Talk
|
11 |
1,772 |
07-05-2020, 05:23 PM |
|
|
Thread: How to go about a password you know has 3 - 5 more or less known words?
Post: RE: How to go about a password you know has 3 - 5 ...
the file redirect with
Code:
--
> two_words.txt
--
was already mentioned above.
Please read more carefully |
|
philsmd |
General Talk
|
11 |
1,772 |
07-05-2020, 05:35 PM |
|
|
Thread: How to go about a password you know has 3 - 5 more or less known words?
Post: RE: How to go about a password you know has 3 - 5 ...
my guess is that you messed your command up.
maybe you specified a wrong file. Make sure that everything after "combinator" is a text file. for instance "combinator combinator ... " do not make sen... |
|
philsmd |
General Talk
|
11 |
1,772 |
07-05-2020, 06:19 PM |
|
|
Thread: How to go about a password you know has 3 - 5 more or less known words?
Post: RE: How to go about a password you know has 3 - 5 ...
instead of
Code:
--
...
--
you should of course insert the path names as explained above.
Yeah, the BOM is indeed a problem, you should open the file in Notepad++ and store the file witho... |
|
philsmd |
General Talk
|
11 |
1,772 |
07-05-2020, 06:47 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
no, mask attack would be MUCH, MUCH faster if you just try "random passwords". every operation involving the disk would slow it down tremendously as already explained above when we compared -a 3 with ... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:28 PM |
|
|
Thread: How to go about a password you know has 3 - 5 more or less known words?
Post: RE: How to go about a password you know has 3 - 5 ...
you could just use --stdout -a 1 or combinator.bin or combinator3.bin to generate a dictionary file.
you could for instance start with a list of 2 words combinated together and with -a 1 add the 3r... |
|
philsmd |
General Talk
|
11 |
1,772 |
07-05-2020, 01:15 PM |