Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
mask attack: the candidates are directly generated/used on GPU, within the GPU kernel code
attack involving dictionaries (-a 0, -a 1, -a 6, -a 7): disk I/O bottleneck AND passwords need to be "send"/... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-06-2020, 12:41 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
if you have some specific idea, you could also develop/program your own password generator (for instance a python script or whatever) and pass the candidates to hashcat like this:
Code:
--
pytho... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:33 AM |
|
|
Thread: Hello all, someone who work with python canl help me
Post: RE: Hello all, someone who work with python canl h...
it depends on which operating system (linux, windows, macOS) you use.
on linux you could just take the output of hashcat and use the "grep" tool to filter it.
Code:
--
hashcat -m 0 -a 3 --sta... |
|
philsmd |
General Talk
|
4 |
909 |
07-16-2020, 05:09 AM |
|
|
Thread: How to get addresses from keys?
Post: RE: How to get addresses from keys?
I don't think so. You would need to have the password to decrypt it and get the private keys (the HD mechanism automatically allows to generate and lookup all the addresses and public keys if you have... |
|
philsmd |
General Talk
|
3 |
728 |
08-05-2020, 03:28 AM |
|
|
Thread: How to get addresses from keys?
Post: RE: How to get addresses from keys?
this makes no sense:
Code:
--
-1 ?u?l -2 ?u?l -3 ?u?l -4 ?u?l
--
they all define the same thing. so do it only once
Code:
--
hashcat -m 22700 -a 3 -w 3 -1 ?u?l -i --increment-min 5 hashe... |
|
philsmd |
General Talk
|
3 |
728 |
08-07-2020, 03:18 AM |
|
|
Thread: Idea: Wordlist-creation from language-statistics
Post: RE: Idea: Wordlist-creation from language-statisti...
If I'm not totally mistaken, you basically describe how markov could help and yeah:
hashcat has built-in support for markov and it's enabled by default (see --help and hcstat2gen from hashcat-utils... |
|
philsmd |
General Talk
|
4 |
593 |
08-18-2020, 09:25 AM |
|
|
Thread: Posting a hash from malware?
Post: RE: Posting a hash from malware?
This : https://twitter.com/TalBeerySec/status/1292734995254190080 ?
vs the password "mimikatz" -m 1000 NTLM hash : https://github.com/gentilkiwi/mimikatz/blob/a2a25cc9f5cbe86cfb6baedf5d3d39aea19b5a... |
|
philsmd |
General Talk
|
2 |
477 |
08-20-2020, 11:03 PM |
|
|
Thread: Idea: Wordlist-creation from language-statistics
Post: RE: Idea: Wordlist-creation from language-statisti...
there is only one disadvantage: the markov chain support is limited to the mask-based attack types (-a 3, and the mask part of -a 6, -a 7).
So if you want to run a dictionary (-a 0 for instance), h... |
|
philsmd |
General Talk
|
4 |
593 |
08-18-2020, 10:52 AM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
Is the content also compressed ? How does the hash start ? With $7z$1$19$... (see https://github.com/philsmd/7z2hashcat#explanation-of-the-hash-format) ?
Which version of hashcat do you use ? do yo... |
|
philsmd |
General Talk
|
6 |
855 |
08-29-2020, 07:55 AM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
you could try with --keep-guessing and see how many false positives you get.
Since it's a crc32 checksum it's not impossible (the decompression errors in case of compression of course would prevent... |
|
philsmd |
General Talk
|
6 |
855 |
08-29-2020, 02:07 PM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
it's not really safe to do it this way, but you could for instance use something like this:
Code:
--
hashcat --stdout -a 3 [THE_MASK] | grep -n -m 1 '^[THE_FALSE_POSITVE_PASSWORD]$'
--
then ... |
|
philsmd |
General Talk
|
6 |
855 |
08-30-2020, 09:20 PM |
|
|
Thread: I have no idea how to crack these hashes?
Post: RE: I have no idea how to crack these hashes?
You are *NOT* allowed to post the hashes here, see: https://hashcat.net/forum/announcement-2.html
BTW: try to base64 decode them, i.e. echo -n "xyz"|base64 -d |
|
philsmd |
General Help
|
2 |
6,506 |
04-04-2013, 06:48 PM |
|
|
Thread: Problem installing catalyst 13.1 in debian
Post: RE: Problem installing catalyst 13.1 in debian
@eljolot did solve his problem (I helped him a little bit on hashcat irc 2-3 days ago) by checking/doing following steps (BTW: he told me he will post the solution here, but I don't see it so I will d... |
|
philsmd |
General Help
|
17 |
69,307 |
04-13-2013, 05:01 PM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
I would suggest you reduce your rule file to the bare minimum needed to reproduce this behaviour and post the few lines here.
As far as I understood, it could be a "bug" regarding the rules !? |
|
philsmd |
General Help
|
15 |
33,317 |
04-14-2013, 11:05 AM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Mystery solved!
Try:
Code:
--
echo -en "elec@\00"|md5sum
9a214e678ed4e501d1576326ce84b41c *-
--
So the string terminator \0 is included into the "search string" when the 'x rule has a lengt... |
|
philsmd |
General Help
|
15 |
33,317 |
04-14-2013, 12:27 PM |
|
|
Thread: hccap to cap ? Possible ?
Post: RE: hccap to cap ? Possible ?
Hi,
I quickly decided to accept this challenge and to try to build a *POC* code that is able to *pseudo*-convert the hccap back to a valid cap file.
ATTENTION: cap2hccap (the "*other*"==reverse) c... |
|
philsmd |
General Help
|
10 |
24,518 |
05-10-2013, 02:37 PM |
|
|
Thread: Problem cracking sample WPA hccap
Post: RE: Problem cracking sample WPA hccap
It is 'hashcat!' since the minimum length is 8 |
|
philsmd |
General Help
|
4 |
11,187 |
05-27-2013, 10:33 AM |
|
|
Thread: My first bruteforce attack
Post: RE: My first bruteforce attack
I think you want to use oclHashcat-plus instead: https://hashcat.net/oclhashcat-plus/
Either download it from link above ^ , or if already done, move to the correct directory. |
|
philsmd |
General Help
|
5 |
14,391 |
05-31-2013, 05:18 PM |
|
|
Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?
Trac ticket and further discussion about possible solutions are located here: https://hashcat.net/trac/ticket/154 |
|
philsmd |
General Help
|
15 |
33,317 |
06-01-2013, 03:50 PM |
|
|
Thread: Catalyst 13.1 Installation Issues
Post: RE: Catalyst 13.1 Installation Issues
Hey obsidian,
please have a look at the dozens of tutorials on the web that address this exact same problem (The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) linux + Catalyst).
We also di... |
|
philsmd |
General Help
|
8 |
18,511 |
06-06-2013, 03:23 PM |