Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Hashcat running VERY slow
Post: RE: Hashcat running VERY slow
bcrypt has a cost factor
2 ^ cost factor is determining the iteration count. You can't compare apple to oranges. different cost factors imply different speeds |
|
philsmd |
hashcat
|
5 |
2,432 |
05-24-2019, 09:25 PM |
|
|
Thread: Hashcat running VERY slow
Post: RE: Hashcat running VERY slow
what are the number of salts and cost factors of the two runs that you are comparing ?
They must be identical to make any conclusions.
$2a$05$
for instance means 2^5 = 32 iterations, but for ... |
|
philsmd |
hashcat
|
5 |
2,432 |
05-24-2019, 09:37 PM |
|
|
Thread: Which mode - passlib.hash.bcrypt_sha256
Post: RE: Which mode - passlib.hash.bcrypt_sha256
support for the PBKDF2-HMAC-SHA* Passlib format is in beta (https://hashcat.net/beta/), see:
https://github.com/hashcat/hashcat/pull/2008
the passlib SHA* hashes did actually work with older versi... |
|
philsmd |
hashcat
|
2 |
1,408 |
05-25-2019, 07:52 AM |
|
|
Thread: hashcat mask attack
Post: RE: hashcat mask attack
12 character brute-force is very large ! the knowledge about the 8 uppercase A-F chars doesn't change that much. The number is still quite huge.
anyway, the answer is to use hashcat mask files toge... |
|
philsmd |
hashcat
|
3 |
2,171 |
05-26-2019, 09:18 AM |
|
|
Thread: Hashcat Brain
Post: RE: Hashcat Brain
it depends on the --brain-client-features that was set (see hashcat --help).
brain + "--brain-client-features 3" (or "--brain-client-features 1") only makes sense with slow hashes (not something li... |
|
philsmd |
hashcat
|
5 |
2,300 |
05-26-2019, 11:45 AM |
|
|
Thread: Hashcat Brain
Post: RE: Hashcat Brain
slow is slow, WPA is slow enough |
|
philsmd |
hashcat
|
5 |
2,300 |
05-26-2019, 01:31 PM |
|
|
Thread: Hashcat Segmentation Fault
Post: RE: Hashcat Segmentation Fault
my bet is that pocl and/or mesa are again the culprit. uninstall them
btw: cracking with a laptop is not a good idea (throttling and cooling issues, destroying the hardware because they are not des... |
|
philsmd |
hashcat
|
3 |
2,479 |
05-30-2019, 12:06 PM |
|
|
Thread: Hashcat not getting any candidates from maskprocessor
Post: RE: Hashcat not getting any candidates from maskpr...
did you try if the maskprocessor command works at all ? does the left part produce any candidates if used alone:
./mp64.bin -i 1:8 ?a?a?a?a?a?a?a?a
also the start is probably very small with lengt... |
|
philsmd |
hashcat
|
9 |
3,469 |
05-31-2019, 12:12 PM |
|
|
Thread: Ryzen 5 2400G: Difference between Linux and Windows wrt -m 1800: Factor 3.5
Post: RE: Difference between Linux and Windows wrt -m 18...
the operating system ideally makes no difference (except if you did some specific tuning with one benchmark and didn't with another). I would suggest to test at least the same versions to make a 1:1 c... |
|
philsmd |
hashcat
|
8 |
3,117 |
05-31-2019, 02:40 PM |
|
|
Thread: Hash speed
Post: RE: Hash speed
try to add -w 3 or even -w 4
you could get even more speed with rules (but of course the overall runtime could increase too).
so the correct answer is:
1. more dedicated/clever attacks (specifi... |
|
philsmd |
hashcat
|
3 |
1,781 |
05-31-2019, 07:08 PM |
|
|
Thread: need help setting up pattern/mask
Post: RE: need help setting up pattern/mask
small dict with very specific rules might help a lot here and crack the hashes much faster. of course it depends on how much you know about the base words and possible rules (like uppercasing the firs... |
|
philsmd |
hashcat
|
3 |
1,781 |
05-31-2019, 07:30 PM |
|
|
Thread: need help setting up pattern/mask
Post: RE: need help setting up pattern/mask
it's probably too long to brute-force, infeasible. maybe dict + rules is a better alternative ?
Code:
--
hashcat -m 14800 -w 3 -a 3 --increment --increment-min 6 --increment-max 10 --custom-char... |
|
philsmd |
hashcat
|
3 |
1,781 |
05-31-2019, 03:34 PM |
|
|
Thread: Hashcat not getting any candidates from maskprocessor
Post: RE: Hashcat not getting any candidates from maskpr...
maybe whenever you find some free time, you could investigate this stdin problem further... did you try with a different terminal ? are you using linux ?
you could also try if "cat" (or windows "ty... |
|
philsmd |
hashcat
|
9 |
3,469 |
05-31-2019, 07:23 PM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
well, you should at least tell us the password, otherwise it's both against the forum rules and impossible for us to know how to test / verify it.
I would say that looking at the code here https://... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 04:15 PM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
I just did clone the repository and checked out the version that you linked in your first post:
Code:
--
git clone https://github.com/rchouinard/phpass
cd phpass/
git checkout 121233fb49db4d929d... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 07:09 PM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
nope. but please do me a favor and do not ignore/disregard the forum rules next time (e.g. posting hashes), they can be read here: https://hashcat.net/forum/announcement-2.html
masking the hash wou... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 07:20 PM |
|
|
Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace
no, that's the wrong value.
the values should be from 580008 to the next keyspace (from the "large" 580008 value to something smaller, that is why it's a "greater than" problem, new mask is smaller... |
|
philsmd |
hashcat
|
6 |
2,894 |
06-02-2019, 03:51 PM |
|
|
Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace
This is indeed an interesting problem, but very difficult to reproduce.
I *think* this is a glitch and hashcat while changing from one mask to another (in your case to or from mask number 1592 of 9... |
|
philsmd |
hashcat
|
6 |
2,894 |
06-02-2019, 09:16 AM |
|
|
Thread: Restore value is greater than keyspace
Post: RE: Restore value is greater than keyspace
good news, I was able to reproduce this problem with a very dedicated mask file (masks with small keyspace after masks with large keyspace, repeated thousands of times).
The problem seems to be loc... |
|
philsmd |
hashcat
|
6 |
2,894 |
06-02-2019, 03:16 PM |
|
|
Thread: hashcat inquiry.
Post: RE: hashcat inquiry.
in theory you could just use the same command without the hash file and using --stdout to see all the password candidates.
e.g. if you had this command:
Code:
--
hashcat -m 14800 -r my.rules ha... |
|
philsmd |
hashcat
|
2 |
1,466 |
06-03-2019, 09:38 AM |