Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: RC4 attack for 40bit Word 97-2003
Post: RE: RC4 attack for 40bit Word 97-2003
?b means that hashcat should try all possible values a byte can have, i.e.
from 0x00 to 0xff, this means that each byte has 256 possibilities
256^5 = 256*256*256*256*256 = 1099511627776 combinations
... |
|
philsmd |
hashcat
|
6 |
6,545 |
11-16-2017, 12:05 PM |
|
|
Thread: Problems with the encodings of dictionaries ...
Post: RE: Problems with the encodings of dictionaries .....
russian passwords could also be encoded with CP1251 or KOI8-R etc.
Pro tip: there are some charsets shipped with hashcat (see for instance the charsets/standard/Russian folder under your extracted ha... |
|
philsmd |
hashcat
|
5 |
4,523 |
11-16-2017, 09:34 PM |
|
|
Thread: Stdin and stdout simultaneously
Post: RE: Stdin and stdout simultaneously
Yes this already works.
You must be doing something wrong, because this is working perfectly fine here.
You can troubleshoot it with just an echo command, e.g:
echo test | ./hashcat64.bin --st... |
|
philsmd |
hashcat
|
3 |
4,064 |
11-17-2017, 09:01 AM |
|
|
Thread: Very Specific Cracking Method
Post: RE: Very Specific Cracking Method
I think that would quickly result in way too many combinations/password candidates.
It of course depends on how small your wordlist is.
If the wordlist is very small you could for instance just genera... |
|
philsmd |
hashcat
|
3 |
4,054 |
11-17-2017, 01:52 PM |
|
|
Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself
The output of --keyspace can be used to distribute cracking, i.e. you can use the value from --keyspace and divide it into x chunks (best would be if the chunk size depends on the performance of your ... |
|
philsmd |
hashcat
|
15 |
20,288 |
11-24-2017, 09:40 AM |
|
|
Thread: 4.01 ERROR "Restore value is greater than keyspace" after pause/checkpoint
Post: RE: 4.01 ERROR "Restore value is greater than keys...
oh. you tried to run the downloaded github project page as a perl file.
This is not how it works.
You need to download the perl script (text file) from https://raw.githubusercontent.com/philsmd/an... |
|
philsmd |
hashcat
|
7 |
5,866 |
11-28-2017, 04:16 PM |
|
|
Thread: http authentication
Post: RE: http authentication
The format is as explained here: https://github.com/hashcat/hashcat/issues/1021 just this one:
$sip$*[URI_SERVER]*[URI_CLIENT]*[USERNAME]*[REALM]*[METHOD]*[URI_PREFIX]*[URI_RESOURCE]*[URI_SUFFIX]*[NON... |
|
philsmd |
hashcat
|
1 |
2,164 |
11-28-2017, 05:16 PM |
|
|
Thread: old TrueCrypt volumes
Post: RE: old TrueCrypt volumes
First of all to answer you question, you normally would use a mask attack like this:
Code:
--
hashcat64.exe -m 6222 -a 3 --increment --increment-min 9 J:\tc\mooi2009.tc -2 "XxZzJjTtUuQq?d;:,.!@#$%... |
|
philsmd |
hashcat
|
1 |
2,457 |
11-18-2017, 05:29 PM |
|
|
Thread: Max Pass Length using Wordlists
Post: RE: Max Pass Length using Wordlists
You could also just use reject rules from: https://hashcat.net/wiki/doku.php?id=rule_based_attack#rules_used_to_reject_plains
e.g.
Code:
--
hashcat -m 0 -a 0 -w 3 -j " |
|
philsmd |
hashcat
|
7 |
5,996 |
12-01-2017, 02:56 PM |
|
|
Thread: merge dictionary or not?
Post: RE: merge dictionary or not?
It makes sense if there are a lot of duplicates.
On linux you would just sort and unique the words with "sort -u"
Code:
--
sort -u wordlist_folder/* -o sort_and_uniqued.txt
--
|
|
philsmd |
hashcat
|
2 |
2,687 |
12-03-2017, 10:27 AM |
|
|
Thread: Another newbie question
Post: RE: Another newbie question
It's always a good idea to create a new and similar volume (same settings/steps) and use this with a password (could also be similar to the one that you think was used) for testing hashcat.
The first... |
|
philsmd |
hashcat
|
3 |
3,665 |
11-24-2017, 03:30 PM |
|
|
Thread: Another newbie question
Post: RE: Another newbie question
Yes, in theory you could use also a hex editor to extract the 512 bytes. Just make sure that the final "hash file" contains the data in binary (it does not work with hexadecimals in the hash file, it ... |
|
philsmd |
hashcat
|
3 |
3,665 |
11-25-2017, 12:23 PM |
|
|
Thread: proper use of increment option
Post: RE: proper use of increment option
We need to distinguish between the minimum and maximum password length supported by the algorithm and OpenCL kernels ... and the settings the user sets (with --increment-max for instance).
What you ... |
|
philsmd |
hashcat
|
6 |
17,939 |
11-26-2017, 10:03 AM |
|
|
Thread: No hashes loaded, line length exception?
Post: RE: No hashes loaded, line length exception?
I think there is some special byte in there, like the windows BOM etc.
Hashcat doesn't expect that there is any other bytes within the hash file except the bytes that are required ("the hash").
... |
|
philsmd |
hashcat
|
7 |
14,268 |
12-03-2017, 10:28 AM |
|
|
Thread: correct command line
Post: RE: correct command line
your -p parameter makes no sense. -p makes no sense in combination with veracrypt (and if you use it in other situations you would need to specify the character that must be used as a separator)
I'... |
|
philsmd |
hashcat
|
24 |
22,564 |
12-04-2017, 08:51 PM |
|
|
Thread: No hashes loaded, line length exception?
Post: RE: No hashes loaded, line length exception?
If it is a non-sensitive archive, just open a issue here, explain the issue again and attach the file to the guthub issue: https://github.com/philsmd/7z2hashcat
Otherwise, I might give it a glance ... |
|
philsmd |
hashcat
|
7 |
14,268 |
12-05-2017, 08:44 AM |
|
|
Thread: crc32 hash format, No hashes loaded, line length exception?
Post: RE: crc32 hash format, No hashes loaded, line leng...
This is not the correct hash format that you use.
The correct hash format can always be determined by looking at the example hashes here https://hashcat.net/wiki/doku.php?id=example_hashes (or using ... |
|
philsmd |
hashcat
|
2 |
2,586 |
12-05-2017, 04:29 PM |
|
|
Thread: 4.01 ERROR "Restore value is greater than keyspace" after pause/checkpoint
Post: RE: 4.01 ERROR "Restore value is greater than keys...
Thank you for this report. I can reproduce this.
We probably will need to open a github issue to track this problem.
The problem seems to be that the mask position (see https://hashcat.net/wiki/doku... |
|
philsmd |
hashcat
|
7 |
5,866 |
11-27-2017, 11:28 PM |
|
|
Thread: 4.01 ERROR "Restore value is greater than keyspace" after pause/checkpoint
Post: RE: 4.01 ERROR "Restore value is greater than keys...
We already have some good news.
The problem was addressed and fixed with these source code changes: https://github.com/hashcat/hashcat/commit/42d1db42947854311028e5c25b91e9af2d154a49
The new bet... |
|
philsmd |
hashcat
|
7 |
5,866 |
11-28-2017, 10:34 AM |
|
|
Thread: Scrypt wallet hash
Post: RE: Scrypt wallet hash
well, you should at least remember if you had bitcoins or ethereums.
These are 2 different type of crypto coins.
If you had ethereum, you need to use ethereum2john.py
if you had bitcoins instead, yo... |
|
philsmd |
hashcat
|
2 |
2,792 |
11-28-2017, 08:24 PM |