Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Two hashes one result - why?
Post: RE: Two hashes one result - why?
There is not much you need to learn here. It is very simple.
OS X v10.8+ (-m 7100) uses PBKDF2, which allows to have a variable output (digest/hash) length.
oclHashcat doesn't care much about this... |
|
philsmd |
Old hashcat Support
|
6 |
8,328 |
03-04-2015, 04:26 PM |
|
|
Thread: How to crack a password in this way with hashcat ?
Post: RE: How to crack a password in this way with hashc...
This trac ticket https://hashcat.net/trac/ticket/539 seems to be related to your question.
The main reasons it wasn't implemented yet, was that the full details about the maximum length devs should... |
|
philsmd |
Old hashcat Support
|
1 |
4,407 |
03-26-2015, 11:50 AM |
|
|
Thread: How to calc (md5(md5($pwd).$salt) ?
Post: RE: How to calc (md5(md5($pwd).$salt) ?
This is the algorithm used by the forum software/board VBulletin.
Hence, depending on the salt length, you either need to use -m 2611 (very short salts) or -m 2711 (longer salts).
For examples see h... |
|
philsmd |
Old hashcat Support
|
4 |
9,058 |
05-10-2015, 10:42 AM |
|
|
Thread: hashcat problem
Post: RE: hashcat problem
You should never use --show while cracking (and while specifying a wordlist, mask etc).
Please read the wiki: FAQ: --show (https://is.gd/HiV9cw) |
|
philsmd |
Old hashcat Support
|
4 |
7,772 |
05-29-2015, 09:26 PM |
|
|
Thread: seperator unmatched
Post: RE: seperator unmatched
You are not allowed to post hashes, see: https://hashcat.net/forum/announcement-2.html
I/we should ban you immediately for 1 week.
Anyway, the problem is that you need to use -m 1000 and use the... |
|
philsmd |
Old hashcat Support
|
2 |
11,273 |
06-16-2015, 04:26 PM |
|
|
Thread: SIP: search using the dictionary is not working.
Post: RE: SIP: search using the dictionary is not workin...
You need to remove all extra characters around the correct password (remove all extra spaces, tabs etc)
Also why do you not simple create a new word list with just the correct password in it and trou... |
|
philsmd |
Old hashcat Support
|
3 |
6,755 |
06-22-2015, 10:50 AM |
|
|
Thread: TeamSpeak Hash?
Post: RE: TeamSpeak Hash?
okay I investigated this a little bit and indeed there are 2+ hashing algorithms used for teamspeak, the one for the server query password was already mentioned above so I will skip that now (it is ju... |
|
philsmd |
Old hashcat Support
|
13 |
25,728 |
06-27-2015, 11:17 PM |
|
|
Thread: input file format
Post: RE: input file format
You can find the hash format for all the supported hash types here: https://hashcat.net/wiki/doku.php?id=example_hashes |
|
philsmd |
Old hashcat Support
|
1 |
13,283 |
11-05-2015, 10:27 AM |
|
|
Thread: Error ? --pw-min is a reserved parameter for Prince attack mode
Post: RE: Error ? --pw-min is a reserved parameter for P...
From the --help output (and wiki and forum and ...) you can easily see that the options you are looking for are:
Code:
--
--increment Enable increment mode
--increment-min=NUM Start i... |
|
philsmd |
Old hashcat Support
|
2 |
7,090 |
08-25-2015, 06:57 PM |
|
|
Thread: Hashcat v 0.50 "increment error"
Post: RE: Hashcat v 0.50 "increment error"
Just have a look at the --help output
Code:
--
--increment Enable increment mode
--increment-min=NUM Start incrementing at NUM
--increment-max=NUM Stop incrementing at NUM
--
... |
|
philsmd |
Old hashcat Support
|
5 |
8,423 |
11-22-2015, 05:18 PM |
|
|
Thread: Remove doesn't work on dictionnary attack ?
Post: RE: Remove doesn't work on dictionnary attack ?
First, please make sure that you use the newest release version of cpu hashcat (0.50).
It is important that your md5_0.hash file is uniqued, so no duplicate hashes (use sort -u md5_0.hash | sponge ... |
|
philsmd |
Old hashcat Support
|
8 |
11,130 |
12-01-2015, 05:38 PM |
|
|
Thread: Remove doesn't work on dictionnary attack ?
Post: RE: Remove doesn't work on dictionnary attack ?
Autrui Wrote: (12-01-2015, 06:01 PM)
--
Code:
--
No hashes loaded
--
--
It seems that it worked for you too: If it says "No hashes loaded" the file "md5_0.hash" is probably empty (and therefor... |
|
philsmd |
Old hashcat Support
|
8 |
11,130 |
12-01-2015, 06:13 PM |
|
|
Thread: Remove doesn't work on dictionnary attack ?
Post: RE: Remove doesn't work on dictionnary attack ?
I can't reproduce the problem here; no matter what I try.
Maybe you have some special setup: for instance a remote drive (not a local disk), the file/directory does not have write permissions etc.
A... |
|
philsmd |
Old hashcat Support
|
8 |
11,130 |
12-02-2015, 11:01 AM |
|
|
Thread: preppend number to dictionary
Post: RE: preppend number to dictionary
Think about it one more time!
If you first prepend 1
then prepend 2
then prepend 3
then prepend 4
then prepend 5
you end up prepending "54321"
so you need to reverse it to ^5^4^3^2^1 if you want to ... |
|
philsmd |
Old hashcat Support
|
2 |
4,398 |
01-15-2016, 12:27 AM |
|
|
Thread: kernel security check failure
Post: RE: kernel security check failure
This doesn't seem have anything (not even the most remotely) to do with oclHashcat.
The error message implies (according to my fast research) that your system has some serious problems, either with R... |
|
philsmd |
Old hashcat Support
|
9 |
24,406 |
01-20-2016, 12:49 PM |
|
|
Thread: gpu intel
Post: RE: gpu intel
The minimum password length for -m 2500 = WPA/WPA2 is 8 characters.
Just read the warning and it should be very clear indeed. |
|
philsmd |
Old hashcat Support
|
7 |
9,274 |
05-13-2016, 02:00 PM |
|
|
Thread: -m 13100 (Kerberos 5 TGS-REP etype 23) return Invalid hash-type specified ???
Post: RE: -m 13100 (Kerberos 5 TGS-REP etype 23) return ...
If the output of
Code:
--
cudaHashcat64.exe --help
--
doesn't list the hash mode you are trying to use, in your case 13100, it means that this specific version does not support -m 13100.
It is as s... |
|
philsmd |
Old hashcat Support
|
1 |
6,622 |
05-29-2016, 06:42 PM |
|
|
Thread: Creating new or custom charset for hashcat
Post: RE: Creating new or custom charset for hashcat
@S3TH: You really need to understand hashcat's definitions of:
1. mask attack
2. built-in and custom charsets
3. rules (which in hashcat's term is a completely different attack), please don't ever mix... |
|
philsmd |
Old hashcat Support
|
3 |
28,490 |
03-19-2016, 11:32 AM |
|
|
Thread: hashcat v0.45
Post: hashcat v0.45
* changes v0.44 -> v0.45:
Download here: https://hashcat.net/hashcat/
Release with some new algorithms:
AIX smd5
AIX ssha1, ssha256, ssha512
GOST R 34.11-94
We managed also to fix some b... |
|
philsmd |
Old hashcat Announcements
|
0 |
9,601 |
06-01-2013, 02:37 AM |
|
|
Thread: hashcat v0.46
Post: hashcat v0.46
* changes v0.45 -> v0.46:
We are happy to announce hashcat version 0.46; a major release w/ some new algorithms,
several interesting new features, improvements and some bug fixes
Download here... |
|
philsmd |
Old hashcat Announcements
|
2 |
28,086 |
06-26-2013, 11:13 AM |