Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
It is the device password! If I change my pin to 8 digits there is a very slight change:
length="8" ... numeric="8" ... nonletter="8"
It seems fun, but it really isn't. For shame!!!
Anyone can confir... |
|
philsmd |
User Contributions
|
47 |
208,553 |
04-12-2013, 12:02 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
It seems to log into a rooted device you only need to *remove* this policy file and reboot:
https://www.digitalmobile.in/community/threads/remove-pattern-lock-of-any-android-device.1893/
EDIT: But o... |
|
philsmd |
User Contributions
|
47 |
208,553 |
04-12-2013, 12:25 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail.
Of course this conversion is easy, but maybe someone di... |
|
philsmd |
User Contributions
|
47 |
208,553 |
04-12-2013, 03:33 PM |
|
|
Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat
Amazing speeds! Great, thx for the port and update here |
|
philsmd |
User Contributions
|
7 |
23,945 |
04-22-2013, 01:03 PM |
|
|
Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat
Hi guys, thx @atom,
and here are the details, it is (partially) too easy to be true and not understandable why nobody else came up with this details b4 ;-):
- smd5 uses md5_crypt basically
- ssha* var... |
|
philsmd |
User Contributions
|
7 |
23,945 |
04-20-2013, 10:34 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t... |
|
philsmd |
User Contributions
|
47 |
208,553 |
01-09-2014, 03:03 PM |
|
|
Thread: Problem with performance
Post: RE: Problem with performance
Please read here: https://hashcat.net/trac/ticket/368#comment:3 |
|
philsmd |
User Contributions
|
4 |
11,407 |
03-05-2014, 08:59 PM |
|
|
Thread: Sapphire R2 290 benchmark
Post: RE: Sapphire R2 290 benchmark
What regards the hang, did you use this registry patch for the driver timeout?
https://hashcat.net/wiki/doku.php?id=timeout_patch |
|
philsmd |
User Contributions
|
2 |
7,210 |
07-13-2014, 06:14 PM |
|
|
Thread: Breaking Notes/Domino 8+ H-hashes
Post: Breaking Notes/Domino 8+ H-hashes
So recently we added support for Lotus Notes/Domino 8 hashes (-m 9100).
Since we know that many of you are interested in the details about this hash algorithm, I will try to explain the algo here.
It... |
|
philsmd |
User Contributions
|
2 |
21,691 |
07-19-2014, 12:03 AM |
|
|
Thread: Android Full Disk Encryption
Post: RE: Android Full Disk Encryption
I added to the wiki an example hash for -m 8800.
Please see https://hashcat.net/wiki/doku.php?id=example_hashes , file: hashcat.android43fde
Password is like for all other samples "hashcat".
I extra... |
|
philsmd |
User Contributions
|
13 |
55,415 |
09-13-2014, 12:56 PM |
|
|
Thread: Help with Hash
Post: RE: Help with Hash
No.
According to the forum rules you've accepted you are not allowed to post hashes.
You will be banned for 1 week and this thread will be closed.
After the 1 week off, you hopefully did unders... |
|
philsmd |
User Contributions
|
1 |
4,788 |
10-20-2014, 09:40 AM |
|
|
Thread: Details about new SAP CODVN H - Iterated random-salted passwords (PWDSALTEDHASH)
Post: RE: Details about new SAP CODVN H - Iterated rando...
Great.
Very well done.
But there is a very important thing you missed in your nice description:
as far as we know oclHashcat is the first cracker to support cracking those sap h hashes
:P
No ... |
|
philsmd |
User Contributions
|
2 |
17,852 |
11-04-2014, 12:06 AM |
|
|
Thread: Details about new Cisco algos ($8$ = -m 9200 and $9$ = -m 9300)
Post: Details about new Cisco algos ($8$ = -m 9200 and $...
Remember the two "new" hash types that we've announced in August this year?
I'm speaking about the 2 new hash types used in some new Cisco routers with latest firmware, one of which is pbkdf2-hmac-sh... |
|
philsmd |
User Contributions
|
0 |
8,213 |
11-03-2014, 05:36 PM |
|
|
Thread: PBKDF2 new format hash
Post: RE: PBKDF2 new format hash
Thanks for the links.
But please (as said) stick to the ticket https://hashcat.net/trac/ticket/256 , otherwise we need to cross-post everything and devs need to look for the required information on... |
|
philsmd |
User Contributions
|
3 |
9,610 |
01-23-2015, 11:57 AM |
|
|
Thread: PBKDF2 new format hash
Post: RE: PBKDF2 new format hash
Why do you not write your comments on trac directly?
What regards the trac ticket, I was asking for more details and where this hash type is being used (common CMS, other software etc) but we didn't ... |
|
philsmd |
User Contributions
|
3 |
9,610 |
01-21-2015, 10:02 AM |
|
|
Thread: Third-party utility: analyze_hccap
Post: Third-party utility: analyze_hccap
analyze_hccap is a new small perl script I developed which sometimes can be very handy to analyze the content of .hccap files (for -m 2500 = WPA cracking, see https://hashcat.net/wiki/doku.php?id=hcca... |
|
philsmd |
User Contributions
|
3 |
7,990 |
01-28-2015, 11:40 AM |
|
|
Thread: Third-party utility: analyze_hc_restore
Post: Third-party utility: analyze_hc_restore
analyze_hc_restore is a perl script I have developed that can be very handy to help analyze and mofify oclHashcat .restore files ( https://hashcat.net/wiki/doku.php?id=oclhashcat#parsing_the_restore-f... |
|
philsmd |
User Contributions
|
3 |
7,403 |
01-28-2015, 11:45 AM |
|
|
Thread: [.Net 4.5] Leukocyte_GUI_for_oclHashcat (GUI wrapper)
Post: RE: [.Net 4.5] Leukocyte_GUI_for_oclHashcat (GUI w...
Very nice design indeed.
Thank you very much for the contribution |
|
philsmd |
User Contributions
|
19 |
35,842 |
02-27-2015, 12:49 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes
For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c... |
|
philsmd |
User Contributions
|
47 |
208,553 |
03-03-2015, 02:41 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Thanks for the report. I did fix it here: https://github.com/philsmd/7z2hashcat/commit/64ac67c42e72d0573fb84098df3699526876209d
But I am unsure why it enters that specific section in your case (e.g... |
|
philsmd |
User Contributions
|
28 |
70,367 |
04-28-2015, 07:57 AM |