Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
https://i.postimg.cc/zfwB1t82/a.png
the wireshark filter used in this image:
frame contains " = hexMD5" || frame contains "password="
answer 1: A1 (response (POST) from client with "password=",... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-24-2019, 06:57 PM |
|
|
Thread: Not found hash Removing
Post: RE: Not found hash Removing
you are searching for this command line option:
Code:
--
--left | Compare hashlist with potfile; show uncracked hashes
--
and of course the opposite of --left is --show
btw: you are not all... |
|
philsmd |
General Talk
|
1 |
1,528 |
03-24-2019, 02:53 PM |
|
|
Thread: mask processor
Post: RE: mask processor
use .hcmask file for several different masks https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
my.hcmask
Code:
--
?l?l?l?l?l?l?l?l
?l?l?l?l?l?l?l?d
?l?l?l?l?l?l?d?l
?l?l?l?... |
|
philsmd |
General Talk
|
3 |
2,104 |
04-02-2019, 01:04 PM |
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).
as we told you already hundreds of times (at least that ... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-05-2019, 05:03 PM |
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
yeah, -a 0 (dictionary attack) makes most sense with -m 2501 and -m 16801
the general approach is to use wlangenpmk (or wlangenpmkocl for OpenCL support) from https://github.com/ZerBea/hcxkeys
... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-06-2019, 09:03 AM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
sorry to hear about your loss.
I think something like this explains the format pretty well: https://apple.stackexchange.com/questions/220729/what-type-of-hash-are-a-macs-password-stored-in/220863#2... |
|
philsmd |
General Talk
|
8 |
3,915 |
05-22-2019, 08:11 AM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
yeah, it's very likely that you messed something up in converting (base64 to hex) or truncating the entropy part.
I would suggest that you also try with the example hash from https://hashcat.net/wi... |
|
philsmd |
General Talk
|
8 |
3,915 |
05-29-2019, 09:38 AM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
yeah, never ignore self-test errors. They are warning you that there is something wrong.
You could also test beta from https://hashcat.net/beta/ or release versions (even try with older ones) from ... |
|
philsmd |
General Talk
|
8 |
3,915 |
05-31-2019, 07:35 PM |
|
|
Thread: Guidance for creation of custom kernels
Post: RE: Guidance for creation of custom kernels
I would say that the best thing for now is to just have a look at the github commit history and check for the addition of (already added) new hash types, like this one: https://github.com/hashcat/hash... |
|
philsmd |
General Talk
|
2 |
1,858 |
06-15-2019, 09:33 AM |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
What is the thread you are referring at ?
What are the files that you have ? wallet.dat ?
Which software (and which version of that software) did generate this wallet ?
hashcat support bitcoi... |
|
philsmd |
General Talk
|
9 |
3,605 |
07-10-2019, 11:41 AM |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
you use bitcoin2john.py to convert the wallet.dat file into a hash:
https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/bitcoin2john.py
install and use python 2.7 to ... |
|
philsmd |
General Talk
|
9 |
3,605 |
07-11-2019, 09:55 AM |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
see --help
-a 0 is dictionary attack and you need to provide a dictionary
-a 3 is mask attack (or "brute-force") and you need to provide a mask
upper = 26 chars, lower = 26 chars, digits = 10 c... |
|
philsmd |
General Talk
|
9 |
3,605 |
07-11-2019, 12:21 PM |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
I don't know about that. If you say it's a "complex password system" maybe it's not random at all. I don't know about the specifics of your password system, it could be flawed and not that difficult t... |
|
philsmd |
General Talk
|
9 |
3,605 |
07-11-2019, 01:22 PM |
|
|
Thread: PMKID cracked but which AP?
Post: RE: PMKID cracked but which AP?
As you can see here https://hashcat.net/wiki/doku.php?id=example_hashes the hash format is designed in a way that it has the MAC addresses etc in it to easily recognize the network.
Which versions ... |
|
philsmd |
General Talk
|
3 |
1,678 |
07-28-2019, 11:22 AM |
|
|
Thread: PMKID cracked but which AP?
Post: RE: PMKID cracked but which AP?
try https://hashcat.net/beta/ . a lot of things changed already since last release of latest hashcat version |
|
philsmd |
General Talk
|
3 |
1,678 |
07-28-2019, 08:32 PM |
|
|
Thread: track the cracking?
Post: RE: track the cracking?
in theory you could just count the lines in your hashcat.potfile for instance every hour or every week and make statistics out of this. As far as I know it's not directly logged in the hashcat.log fil... |
|
philsmd |
General Talk
|
4 |
1,798 |
09-12-2019, 07:55 PM |
|
|
Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $
do you have the source code for this ?
I guess without it it's just a (maybe impossible) guessing game. it could be anything. The software could even mix in some kind of pepper (an additional stati... |
|
philsmd |
General Talk
|
4 |
1,671 |
09-24-2019, 10:42 AM |
|
|
Thread: Script or tool for hashing lines needed
Post: RE: Script or tool for hashing lines needed
you can use tools/test.pl for it
Code:
--
cat example.dict | perl ./tools/test.pl passthrough 0
--
|
|
philsmd |
General Talk
|
4 |
1,596 |
09-25-2019, 07:46 PM |
|
|
Thread: 4 charsets limit (mask attack)
Post: RE: 4 charsets limit (mask attack)
our rule engine works on GPU to achieve full speed.
It's not a good idea to have dynamic buffers/memory/sizes which would reduce speed tremendously and make code much more complex. it's just a well-c... |
|
philsmd |
General Talk
|
2 |
1,213 |
11-29-2019, 09:29 AM |
|
|
Thread: 7z2Hashcat Output | What is this?
Post: RE: 7z2Hashcat Output | What is this?
well, the 2 data length bounds between 7z2hashcat and hashcat are in sync... therefore if you increase one (the 7z2hashcat perl file), you would also need to increase the other one (in hashcat source ... |
|
philsmd |
General Talk
|
5 |
2,402 |
12-17-2019, 09:47 AM |