Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Hybrid Attack
Post: RE: Hybrid Attack
This is a warning. It is not an error message.
With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration. |
|
philsmd |
hashcat
|
3 |
3,011 |
02-12-2018, 10:48 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
it's not allowed to post hashes.
The encryption used by the PDF algorithm uses a 128 bit key.
This key is derived by a key-derivation-function and will be generated from your password as an inpu... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-12-2018, 10:51 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions).
Mask attack is in general not a good strategy to recover a password f... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-13-2018, 12:04 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
I'm not sure exactly what the problem is and why a second instance is still running.
Anyways, to solve it you just need to stop the second instance (either via job control - or "task manager"-like ... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 05:50 PM |
|
|
Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5
Please do one of the following actions:
1. after stopping your current running hashcat instance (the one with --session etc), delete the file "hashcat.pid" from the main hashcat folder
2. copy all y... |
|
philsmd |
hashcat
|
7 |
10,362 |
02-06-2018, 08:41 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
You basically already answered your own question by explaining the algorithm details and linking to the algorithm description.
Furthermore, this question was already recently addressed within this fo... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-10-2018, 07:39 PM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the di... |
|
philsmd |
hashcat
|
6 |
5,814 |
02-15-2018, 10:30 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:49 PM |
|
|
Thread: WPA and first hash
Post: RE: WPA and first hash
https://hashcat.net/forum/thread-6355-post-33892.html#pid33892
https://github.com/hashcat/hashcat/issues/1167 |
|
philsmd |
hashcat
|
2 |
2,750 |
02-27-2018, 05:58 PM |
|
|
Thread: include SHA1 Hash with the results
Post: RE: include SHA1 Hash with the results
you can use --left to show all hashes that are not cracked yet and --show to show all hashes that are already cracked with the corresponding passwords (see: https://hashcat.net/wiki/doku.php?id=freque... |
|
philsmd |
hashcat
|
1 |
1,916 |
02-27-2018, 06:51 PM |
|
|
Thread: OpenCL ERROR
Post: RE: OpenCL ERROR
The intel core I5 is your CPU not your GPU.
You literally posted a spec sheet that says that your graphics cards does not support OpenCL:
OpenCL: No
It it is not supported by the hardware vendo... |
|
philsmd |
hashcat
|
5 |
4,947 |
03-02-2018, 10:19 AM |
|
|
Thread: Potfile entries and output file
Post: RE: Potfile entries and output file
yeah, it's exactly how it was designed.
If the hashes are already present within the pot file it means that they were also already outputted somehow, therefore there is no need to do it again and aga... |
|
philsmd |
hashcat
|
5 |
9,401 |
03-12-2018, 10:44 PM |
|
|
Thread: Potfile entries and output file
Post: RE: Potfile entries and output file
In some cases you could just extract some lines from the potfile itself (like "cat hashcat.potfile"), but this is not a good idea in general.
It's always advisable to keep all the original files |
|
philsmd |
hashcat
|
5 |
9,401 |
03-12-2018, 10:50 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
The algorithm doesn't allow to recover the whole seed (if it was really generated in a cryptographically secure random way) by just knowing some bytes (let's say 80) of the encrypted seed (furthermore... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:24 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
Well, there is no secret at all. The neo code is open source and even already linked above.
Here for instance is the verify function:
https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 10:08 AM |
|
|
Thread: Line-length exception for Etherum Wallet
Post: RE: Line-length exception for Etherum Wallet
The hash for -m 15700 must start with "$ethereum$s*". You need to remove all file names if there are any file names within the output of ethereum2john.py.
You also should use a hash file just to ma... |
|
philsmd |
hashcat
|
2 |
2,277 |
03-14-2018, 12:23 AM |
|
|
Thread: Issue with large hcmask file
Post: RE: Issue with large hcmask file
walterlacka do you also run it without --restore?
can you provide the full details (number of masks) and the .restore file?
does it always stop at the same mask? If you upload the .restore file we w... |
|
philsmd |
hashcat
|
15 |
9,382 |
03-16-2018, 07:34 PM |
|
|
Thread: 7Zip Hash, missing SALT? (Salt-value exception)
Post: RE: 7Zip Hash, missing SALT? (Salt-value exception...
What is the command you run ?
Are you able to crack the example hash from https://hashcat.net/wiki/example_hashes ? |
|
philsmd |
hashcat
|
14 |
10,239 |
03-19-2018, 08:03 AM |
|
|
Thread: 7Zip Hash, missing SALT? (Salt-value exception)
Post: RE: 7Zip Hash, missing SALT? (Salt-value exception...
If you use the straight word list attack mode (-a 0) you also need to specify a dictionary file.
hashcat -a 0 -m 11600 hash_file.txt dict_file.txt
you could also add rules like this:
hashcat -a... |
|
philsmd |
hashcat
|
14 |
10,239 |
03-19-2018, 06:34 PM |