Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: noob question
Post: RE: noob question
It's explained here: https://hashcat.net/faq#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
Code:
--
hashcat -m 0 -a 0 -w 3 --username --separa... |
|
philsmd |
hashcat
|
6 |
6,037 |
08-16-2017, 09:05 AM |
|
|
Thread: Error with estimated time
Post: RE: Error with estimated time
@MattSR
Thanks for the report. It seems it was successfully fixed with the newest beta version (hashcat 3.6.0+367 or newer, https://hashcat.net/beta/).
See https://github.com/hashcat/hashcat/pull/... |
|
philsmd |
hashcat
|
6 |
5,301 |
08-16-2017, 06:05 PM |
|
|
Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Axcrypt: axcrypt2john.py (how to use python)
I understand that it's not your day to day job to develop or run code, but you should at least try to do some research and think about it.
This is not that difficult at all. There are literally thous... |
|
philsmd |
hashcat
|
8 |
7,831 |
08-08-2017, 09:37 PM |
|
|
Thread: foreign words and --remove
Post: RE: foreign words and --remove
for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the... |
|
philsmd |
hashcat
|
3 |
3,868 |
08-09-2017, 08:57 AM |
|
|
Thread: Hashcat SHA1 output "hash:plain" to plain
Post: RE: Hashcat SHA1 output "hash:plain" to plain
Code:
--
hashcat -m 100 --show --outfile-format 2 originalHashList.txt
--
p.s.: do not post hashes. this is against the forum rules. you will get banned |
|
philsmd |
hashcat
|
4 |
5,280 |
08-22-2017, 07:16 AM |
|
|
Thread: Hashcat SHA1 output "hash:plain" to plain
Post: RE: Hashcat SHA1 output "hash:plain" to plain
something like this should work (on linux or mingw):
Code:
--
cut -b 42- hashcat.potfile | ./hashcat --stdout --outfile-autohex-disable
--
or you could also copy the file and use any advance... |
|
philsmd |
hashcat
|
4 |
5,280 |
08-22-2017, 11:00 PM |
|
|
Thread: Pronouncable passwords cracking
Post: RE: Pronouncable passwords cracking
Unfortunately, you can't recover a random password that is that long within a reasonable amount of time.
Just do the math:
?u?l = 26+26 = 52 characters
?d = 10 characters
=> 52 * 52 * 52 * 52 * 52... |
|
philsmd |
hashcat
|
3 |
3,417 |
08-10-2017, 03:56 PM |
|
|
Thread: Hashcat stop randomly
Post: RE: Hashcat stop randomly
Why do you think it stopped without reasons?
From the output you have posted above it seems that everything is working correctly.
I don't see any evidence that there is something strange going on.... |
|
philsmd |
hashcat
|
3 |
3,805 |
08-11-2017, 08:14 PM |
|
|
Thread: how to remove hash from output file
Post: RE: how to remove hash from output file
--outfile-format 2 combined with --username will only output the username and the password.
What you should know is that -o always appends to the file and therefore the file cracked.txt won't be ov... |
|
philsmd |
hashcat
|
3 |
3,469 |
08-14-2017, 10:32 AM |
|
|
Thread: How to generate/try random keys for 3des?
Post: RE: How to generate/try random keys for 3des?
You should be more specific about what you know about the keys/passwords.
If the keys are completely random and k1, k2 and k3 could all be different, then the keyspace is very large (way too large to... |
|
philsmd |
hashcat
|
5 |
4,445 |
08-14-2017, 03:05 PM |
|
|
Thread: multi charset
Post: RE: multi charset
1. it's not allowed to post hashes
2. you need to specify a mask (see https://hashcat.net/wiki/?id=mask_attack) if you use -a 3 (otherwise the default one will be used, which is probably not exactly ... |
|
philsmd |
hashcat
|
3 |
4,680 |
08-23-2017, 03:15 PM |
|
|
Thread: hashcat stops after about 37 minutes
Post: RE: hashcat stops after about 37 minutes
https://hashcat.net/beta/ |
|
philsmd |
hashcat
|
22 |
17,111 |
08-23-2017, 08:01 PM |
|
|
Thread: ERROR: Use of -r/--rules-file and -g/--rules-generate only allowed in attack mode 0.
Post: RE: ERROR: Use of -r/--rules-file and -g/--rules-g...
you need to use -a 0 to use --rules-file (or short -r). The same is true for --rules-generate (or short -g), it is only supported with straight/dictionary attack (-a 0). |
|
philsmd |
hashcat
|
4 |
4,702 |
08-24-2017, 08:23 PM |
|
|
Thread: Office and --show option
Post: RE: Office and --show option
You forgot to also include the command you execute for -m 9820.
It also must contaiin the --username switch.
It probably should be without "$HEX[" and "]''. could be indeed a bug but from your out... |
|
philsmd |
hashcat
|
6 |
5,802 |
08-25-2017, 07:12 AM |
|
|
Thread: Office and --show option
Post: RE: Office and --show option
The problem should be fixed with newest beta version: https://hashcat.net/beta/
The output of --show should now be correct (remember: you need to use the correct -m modes i.e. 9810 and not 9800, ot... |
|
philsmd |
hashcat
|
6 |
5,802 |
08-25-2017, 10:11 AM |
|
|
Thread: How to generate/try random keys for 3des?
Post: RE: How to generate/try random keys for 3des?
I see no reason to use rand () here. That would only make sense if you know the seed (as explained in my previous post). Otherwise it would just slow everything down by a lot.
Furthermore, there is no... |
|
philsmd |
hashcat
|
5 |
4,445 |
08-14-2017, 04:44 PM |
|
|
Thread: noob question
Post: RE: noob question
Hashcat only supports these formats:
with --username
user/name/email:hash
or without --username
hash
all other formats need to be externally converted to one of these formats.
you could fo... |
|
philsmd |
hashcat
|
6 |
6,037 |
08-16-2017, 01:05 PM |
|
|
Thread: can hashcat be used only for hashing?
Post: RE: can hashcat be used only for hashing?
The main problem with your approach (e.g something like "I just want to use the GPU to generate a hash list faster") is that the main bottleneck there for sure is I/O.
Even if you use the fastest SSD... |
|
philsmd |
hashcat
|
3 |
3,955 |
08-20-2017, 03:15 PM |
|
|
Thread: Scrypt + Salsa20/8 128 128
Post: RE: Scrypt + Salsa20/8 128 128
I just did several test with scrypt (even the "pleaseletmein" test) and I found no problem cracking scrypt with hashcat.
Could you please be more specific. What do you mean by "still unable to crac... |
|
philsmd |
hashcat
|
7 |
8,171 |
08-23-2017, 08:37 AM |
|
|
Thread: --limit and --skip usage
Post: RE: --limit and --skip usage
your examples above have 2 different masks:
you used ?l?l?l?l?l?l?l?l for the keyspace calculation and ?l?l?l?l?l?l?l? for the actual run.
You should always use the same mask!
Furthermore, yo... |
|
philsmd |
hashcat
|
2 |
2,896 |
08-25-2017, 12:24 PM |