Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,602 |
02-11-2018, 02:49 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Now, thinking about the padding attack... I think an alternative could work without revealing the whole encseed.
The thing is that the pre-sale algorithm uses padding (as already mentioned a couple... |
|
philsmd |
hashcat
|
26 |
24,602 |
02-11-2018, 04:01 PM |
|
|
Thread: ERROR: cuLaunchKernel() 999
Post: RE: ERROR: cuLaunchKernel() 999
Confirm! Same here ... Newest forceware version GTX 550 |
|
philsmd |
Very old oclHashcat-plus Support
|
27 |
48,970 |
02-19-2013, 03:58 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
you must be doing something wrong.
If I put the javascript code into my browser and run
hexMD5 ('\115' + "22222222" + '\017\226\132\264\231\243\072\025\142\343\313\006\131\010\106\311')
I get this ... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-19-2019, 12:35 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
in the capture test.pcap
if first packet javascript with salt then hash packet after javascript is VERY GOOD
if first packet hash then javascript is VERY BAD
if last packet javascript and NO ... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-22-2019, 01:29 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
https://i.postimg.cc/MpF52GFn/verygoodverybad.png |
|
philsmd |
General Talk
|
27 |
14,953 |
02-22-2019, 07:25 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
I think you are just heavily misinterpreting the tcp dump.
Just think about it a moment. The javascript code must be sent before the hexMD5 () password is sent, because the client needs to know wha... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-21-2019, 10:45 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
1. about the javascript string to hexadecimal conversion: it's just the octal code point (see https://mathiasbynens.be/notes/javascript-escapes#octal) converted to hexadecimal
something like this in ... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-21-2019, 04:38 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
the only problem is that your capture starts in the middle and ends in the middle and therefore only one complete exchange is captured.
Let's make it very clear.
The javascript + salt is the que... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-23-2019, 01:08 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
Q3 is a new question.
A1 was a very old answer.
we do NOT have any answer for question 3 (Q3). We have no question Q1 for answer A1.
This is because you started and stopped the capture in the mid... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-23-2019, 04:28 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
https://i.postimg.cc/zfwB1t82/a.png
the wireshark filter used in this image:
frame contains " = hexMD5" || frame contains "password="
answer 1: A1 (response (POST) from client with "password=",... |
|
philsmd |
General Talk
|
27 |
14,953 |
02-24-2019, 06:57 PM |
|
|
Thread: 7z2hashcat
Post: 7z2hashcat
Since some users already keep asking me for the release of 7z2hashcat which I did announce here ( https://hashcat.net/forum/thread-4320-post-24661.html#pid24661 ), I decided now to publish it on githu... |
|
philsmd |
User Contributions
|
28 |
70,367 |
04-27-2015, 11:49 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Thanks for the report. I did fix it here: https://github.com/philsmd/7z2hashcat/commit/64ac67c42e72d0573fb84098df3699526876209d
But I am unsure why it enters that specific section in your case (e.g... |
|
philsmd |
User Contributions
|
28 |
70,367 |
04-28-2015, 07:57 AM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Please try with newest version (0.3) from https://github.com/philsmd/7z2hashcat
The changes: https://github.com/philsmd/7z2hashcat/commit/675c1639fddab0c831c5b06c1eb325f37c489f8b |
|
philsmd |
User Contributions
|
28 |
70,367 |
05-01-2015, 11:18 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
There is no fixed size for the output of 7z2hashcat.pl. There are just some upper and lower length limits (i.e. the minimum info/bytes required and the maximum number of bytes of the blob that oclHash... |
|
philsmd |
User Contributions
|
28 |
70,367 |
08-21-2015, 02:22 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Hey.
There are actually 2 known problems which I will try to investigate:
1. a problem with the lzma decompression, done by 7z2hashcat.pl, of the header (in case of a "long" file list), probably rel... |
|
philsmd |
User Contributions
|
28 |
70,367 |
01-06-2017, 03:39 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Thanks for the info syb3ria. Great that it at least fixed 1 of the problems you experienced.
I have now opened an issue on 7z2hashcat's github page which explains the current state of the LZMA header... |
|
philsmd |
User Contributions
|
28 |
70,367 |
01-09-2017, 01:35 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Maybe you didn't notice it yet, but we have updated both 7z2hashcat.pl (please use version 0.9 or higher) and hashcat itself (please use the newest beta (https://hashcat.net/beta/)).
In addition to... |
|
philsmd |
User Contributions
|
28 |
70,367 |
01-24-2017, 01:32 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Thanks for the feedback.
So if I understood you correctly everything works correctly now.
The only "problem" you did experience in very rare situation is a very high upper limit in file size (8KiB c... |
|
philsmd |
User Contributions
|
28 |
70,367 |
02-22-2017, 05:49 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
The original 7-zip file (*.7z) is not needed to recover the password.
But the entire output of 7z2hashcat is needed (the whole hash).
Yes, as mentioned here: https://github.com/philsmd/7z2hashcat#... |
|
philsmd |
User Contributions
|
28 |
70,367 |
11-21-2017, 12:30 PM |