Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Error CPU Intel Hashcat 5.1.0.
Post: RE: Error CPU Intel Hashcat 5.1.0.
I just tested it (again) just to make sure it would work.
... and as expected, your claim does not hold (for me it works on any ubuntu > 16.04):
Code:
--
Prerequisites > Missing Prerequisite(s)
---... |
|
philsmd |
hashcat
|
6 |
1,890 |
04-27-2020, 02:34 PM |
|
|
Thread: Sorting many masks by number of combinations?
Post: RE: Sorting many masks by number of combinations?
maybe this one:
PACK (Password Analysis and Cracking Kit): https://github.com/iphelix/pack/
https://web.archive.org/web/20190125201146/https://thesprawl.org/projects/pack/ |
|
philsmd |
hashcat
|
2 |
805 |
04-30-2020, 02:08 PM |
|
|
Thread: Speed up bruteforce H/s
Post: RE: Speed up bruteforce H/s
let's start by letting us know which type of hashes you are targeting.
Throwing some numbers at the table doesn't make much sense without the information about the algorithm / hash type .
BTW: m... |
|
philsmd |
hashcat
|
3 |
845 |
05-01-2020, 12:30 PM |
|
|
Thread: hashcat and $electrum$5* hash
Post: RE: hashcat and $electrum$5* hash
As far as we know, this is a driver problem and happens because of the deflate/zlib decompression code.
This means that for your driver/hardware also the compressed PKZIP modes will fail (not a pro... |
|
philsmd |
hashcat
|
2 |
657 |
05-02-2020, 06:39 PM |
|
|
Thread: Discord
Post: RE: Discord
I think the idea in general is not bad, but it would be much more clever to contact the administrator (atom) or at least some moderators over here or IRC to discuss these types of ideas before announc... |
|
philsmd |
hashcat
|
1 |
900 |
05-02-2020, 06:46 PM |
|
|
Thread: PBKDF2-HMAC-SHA256
Post: RE: PBKDF2-HMAC-SHA256
it's written in the document you linked: https://perlmaven.com/storing-passwords-in-a-an-easy-but-secure-way -> https://metacpan.org/pod/Crypt::PBKDF2 -> "the number of iterations encoded with MIME::B... |
|
philsmd |
hashcat
|
2 |
702 |
05-03-2020, 11:37 AM |
|
|
Thread: Newbie learning how to crack a RAR3 hash.
Post: RE: Newbie learning how to crack a RAR3 hash.
a,lso escaping of the "$RAR3$..." hash is very important... therefore I would suggest to use a hash file, instead of messing around with shell escaping directly in the command
Code:
--
hashcat64.e... |
|
philsmd |
hashcat
|
5 |
1,172 |
05-07-2020, 11:00 AM |
|
|
Thread: The Brain not working as expected (or is it me?)
Post: RE: The Brain not working as expected (or is it me...
Can you show also the server logs ? do the IDs change ? |
|
philsmd |
hashcat
|
21 |
3,577 |
05-08-2020, 11:27 AM |
|
|
Thread: The Brain not working as expected (or is it me?)
Post: RE: The Brain not working as expected (or is it me...
could you please try with latest beta version from https://hashcat.net/beta/ ? just to make sure we are testing with the same version / code. |
|
philsmd |
hashcat
|
21 |
3,577 |
05-08-2020, 12:54 PM |
|
|
Thread: Hashcating 7z passw
Post: RE: Hashcating 7z passw
7z2hashcat from https://github.com/philsmd/7z2hashcat (you would need to either have perl installed or use the windows binary from https://github.com/philsmd/7z2hashcat/releases).
The .7z file must... |
|
philsmd |
hashcat
|
4 |
1,058 |
04-27-2020, 07:08 PM |
|
|
Thread: hashmode sha1(sha1($pass).$salt) support?
Post: RE: hashmode sha1(sha1($pass).$salt) support?
This seems to be similar to:
-m 4520 = sha1($salt.sha1($pass))
-m 4521 = Redmine
-m 4522 = PunBB
but with the $salt at the end instead of at the beginning (all of the above use the salt at the s... |
|
philsmd |
hashcat
|
1 |
521 |
05-04-2020, 07:06 PM |
|
|
Thread: Help implementing FNV1 for a3 mode
Post: RE: Help implementing FNV1 for a3 mode
I would suggest to start with some simple hash types that involve md5/sha1 etc...
In general there are some algorithms listed here, that are not already implemented: https://github.com/hashcat/has... |
|
philsmd |
hashcat
|
1 |
560 |
05-04-2020, 07:11 PM |
|
|
Thread: Slow-candidates for hybrid attacks
Post: RE: Slow-candidates for hybrid attacks
I think there isn't really any serious reasoning why it isn't implemented yet. You could try to request it on github (https://github.com/hashcat/hashcat/issues/) and see if it gets accepted and implem... |
|
philsmd |
hashcat
|
2 |
1,211 |
05-08-2020, 12:59 PM |
|
|
Thread: The Brain not working as expected (or is it me?)
Post: RE: The Brain not working as expected (or is it me...
I currently can't reproduce to get an identical session ID with different hash lists.
could you please provide your full server and client commands and also the hash lists (PM is also okay, or even... |
|
philsmd |
hashcat
|
21 |
3,577 |
05-08-2020, 02:12 PM |
|
|
Thread: separator unmatched
Post: RE: separator unmatched
Could you please explain what you are trying to crack (which type of hashes) and how you are testing ?
The best thing probably would be to just test example hashes from https://hashcat.net/wiki/exa... |
|
philsmd |
hashcat
|
7 |
1,480 |
05-09-2020, 07:35 AM |
|
|
Thread: hashcat has to read through wordlist when using restore or --skip
Post: RE: hashcat has to read through wordlist when usin...
I think this is related: https://github.com/hashcat/hashcat/issues/1644
it's probably much more complicated than just storing 1 additional value... I think the problem has mainly to do with statist... |
|
philsmd |
hashcat
|
4 |
1,267 |
05-07-2020, 10:52 AM |
|
|
Thread: hashcat has to read through wordlist when using restore or --skip
Post: RE: hashcat has to read through wordlist when usin...
I was thinking about this now a little bit and I found another problem...
if the user uses --skip (or short -s) it doesn't mean that the byte offset is available in any file (neither .restore, .dic... |
|
philsmd |
hashcat
|
4 |
1,267 |
05-07-2020, 03:22 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
The command makes no sense.
Defining any custom charset like --custom-charset1 (or short -1) without using it within the mask doesn't make any sense and is actually quite a common user mistake. :(
... |
|
philsmd |
hashcat
|
7 |
1,538 |
05-10-2020, 07:29 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
The algorithm is also not complete. One of the important steps is missing... how does a password cracking tool know if the password is correct ? the verification code i.e. checking the decrypted byte... |
|
philsmd |
hashcat
|
19 |
3,655 |
05-10-2020, 07:34 AM |
|
|
Thread: The Brain not working as expected (or is it me?)
Post: RE: The Brain not working as expected (or is it me...
the naming convention is just:
- brain.[SESSION_ID].ldmp for hashed passwords
- brain.[ATTACK ID].admp for attack positions
that means, that you could just start a quick cracking job again and se... |
|
philsmd |
hashcat
|
21 |
3,577 |
05-11-2020, 03:49 PM |