Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Hashtopussy Mask Attack
Post: RE: Hashtopussy Mask Attack
The problem is that this is not the hashtopussy forum.
Hashtopussy is a 3rd party software. You are asking your question at the wrong place
You should try to find the answers to your questions by ... |
|
philsmd |
General Talk
|
2 |
2,468 |
02-03-2018, 09:10 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
It doesn't look too bad.
but there are at least 2 things that I don't understand:
1. why do you define --custom-charset1 with EFBBBF and only use it at 1 position (this means that hashcat will test ... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-26-2018, 11:30 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
It doesn't look correct to me.
As I already wrote above, the hex 12 (which is decimal 18) and hex 13 (which is decimal 19) do not look correct.
You even write:
Code:
--
?1 = 101213 = Carriage R... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-27-2018, 08:59 AM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
In general you do this mangling (like appending/prepending characters etc) with rule based attacks (with -a 0 and -r my.rule for instance), i.e. you run a wordlist and add those special characters and... |
|
philsmd |
General Talk
|
37 |
24,766 |
01-26-2018, 09:00 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
I don't think that this mask would help or even be correct.
What -a 3 -1 charset --increment --increment-min 10 --increment-max 30
?1?1?1?1?1?1?1?1?1?1?1?1PASSWORD?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1?1... |
|
philsmd |
General Talk
|
37 |
24,766 |
02-06-2018, 05:31 PM |
|
|
Thread: Mask Attack with a "blank" value?
Post: RE: Mask Attack with a "blank" value?
This type of attack makes no sense to me. You are basically just trying some combinations of the characters "0", "5", "7", "!" and "@" (together with --increment right?).
hashcat will generate passwo... |
|
philsmd |
General Talk
|
37 |
24,766 |
02-07-2018, 09:48 AM |
|
|
Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)
If you run hashcat --help (with the latest version of hashcat) you will see that 2501 is supported and within the output.
you can use hcxtools from https://github.com/ZerBea/hcxtools (wlancap2hcx -... |
|
philsmd |
General Talk
|
20 |
19,682 |
03-02-2018, 10:03 AM |
|
|
Thread: Help for rule
Post: RE: Help for rule
Code:
--
hashcat --stdout -a 3 -1 ?l?d?u "^?1 ^?1"
--
|
|
philsmd |
General Talk
|
10 |
6,459 |
07-07-2018, 08:17 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack
Code:
--
hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u
--
|
|
philsmd |
General Talk
|
12 |
8,565 |
07-25-2018, 07:27 PM |
|
|
Thread: No duplicated characters when cracking wpa2 password
Post: RE: No duplicated characters when cracking wpa2 pa...
you also can't really pipe like this:
command1 | cd && command2
you need to do it like this:
command1 | command2
therefore something like this:
Code:
--
cd C:\Users\Alexandre\Downloads\h... |
|
philsmd |
General Talk
|
7 |
5,193 |
09-29-2018, 11:50 AM |
|
|
Thread: No duplicated characters when cracking wpa2 password
Post: RE: No duplicated characters when cracking wpa2 pa...
the command I told you to use was different:
1. enter the hashcat folder within the cmd:
Code:
--
cd C:\Users\Alexandre\Downloads\hashcat-4.2.1\
--
2. afterwards run hashcat within that speci... |
|
philsmd |
General Talk
|
7 |
5,193 |
09-30-2018, 10:46 AM |
|
|
Thread: Unified list manager
Post: RE: Unified list manager
use hashcat in-built --show mechanism instead.
Code:
--
hashcat -m 0 --show --outfile-format 2 hashes.txt
--
this other tool "Unitifed list manager" is a 3th party tool and we don't give sup... |
|
philsmd |
General Talk
|
1 |
1,779 |
11-19-2018, 10:49 PM |
|
|
Thread: Correct way to hash and crack PMKID and benchmark
Post: RE: Correct way to hash and crack PMKID and benchm...
I think there are a lot of misunderstandings here.
I would highly recommend that you re-read this thread again: https://hashcat.net/forum/thread-7717.html
of course -m 16800 = WPA-PMKID-PBKDF2 i... |
|
philsmd |
General Talk
|
1 |
5,147 |
01-30-2019, 02:01 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
you must be doing something wrong.
If I put the javascript code into my browser and run
hexMD5 ('\115' + "22222222" + '\017\226\132\264\231\243\072\025\142\343\313\006\131\010\106\311')
I get this ... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-19-2019, 12:35 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
in the capture test.pcap
if first packet javascript with salt then hash packet after javascript is VERY GOOD
if first packet hash then javascript is VERY BAD
if last packet javascript and NO ... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-22-2019, 01:29 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
https://i.postimg.cc/MpF52GFn/verygoodverybad.png |
|
philsmd |
General Talk
|
27 |
14,953 |
02-22-2019, 07:25 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
I think you are just heavily misinterpreting the tcp dump.
Just think about it a moment. The javascript code must be sent before the hexMD5 () password is sent, because the client needs to know wha... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-21-2019, 10:45 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
1. about the javascript string to hexadecimal conversion: it's just the octal code point (see https://mathiasbynens.be/notes/javascript-escapes#octal) converted to hexadecimal
something like this in ... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-21-2019, 04:38 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
the only problem is that your capture starts in the middle and ends in the middle and therefore only one complete exchange is captured.
Let's make it very clear.
The javascript + salt is the que... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-23-2019, 01:08 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
Q3 is a new question.
A1 was a very old answer.
we do NOT have any answer for question 3 (Q3). We have no question Q1 for answer A1.
This is because you started and stopped the capture in the mid... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-23-2019, 04:28 PM |