Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail.
Of course this conversion is easy, but maybe someone di... |
|
philsmd |
User Contributions
|
47 |
208,552 |
04-12-2013, 03:33 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t... |
|
philsmd |
User Contributions
|
47 |
208,552 |
01-09-2014, 03:03 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes
For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c... |
|
philsmd |
User Contributions
|
47 |
208,552 |
03-03-2015, 02:41 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
This is very easy to crack (and to find out what algo is used), you just need to investigate a little bit and make some tests, see my tests:
Code:
--
./oclHashcat64.bin --quiet -m 110 7baad69b719... |
|
philsmd |
User Contributions
|
47 |
208,552 |
05-27-2015, 11:28 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
if you see that error, just increase the DB_ESSID_MAX value to whatever value you feel comfortable. The risk of doing this is that it might use much more RAM. So you should do it at your own risk.
We... |
|
philsmd |
User Contributions
|
49 |
179,646 |
02-09-2017, 02:15 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
@c4pOne you should definitely make sure you are using the latest version of hashcat-utils (v1.5 or higher), because as you can read/see here https://github.com/hashcat/hashcat-utils/releases, the wind... |
|
philsmd |
User Contributions
|
49 |
179,646 |
02-10-2017, 10:51 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
@abdou99 If you are talking about this screenshot https://hashcat.net/wiki/hccapx#screenshot (you didn't say that explicitly), than you should read the section below the image:
Quote:
--
authentic... |
|
philsmd |
User Contributions
|
49 |
179,646 |
02-10-2017, 02:20 PM |
|
|
Thread: NVidia RTX 2080
Post: RE: NVidia RTX 2080
GrepItAll Wrote: (08-31-2018, 02:40 PM)
--
I have been running 4 x 1080 Ti Asus Turbo cards since September nearly 24/7 (brief downtimes due to hardware relocation) as it was very difficult to purcha... |
|
philsmd |
Hardware
|
93 |
83,309 |
08-31-2018, 07:13 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
If I'm not totally (I mean completely!!!) mistaken you are totally looking at the wrong code.
The code posted by mrfancypants here: https://repl.it/JMbi/4
is not (just) the key generator.
This is a ... |
|
philsmd |
User Contributions
|
182 |
305,384 |
07-16-2017, 09:11 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Please be more specific at which code you are refering to. There are a lot of code snippets within this thread, e.g. 2 for different algorithms, one for searching a (8 char) substring of a specific pa... |
|
philsmd |
User Contributions
|
182 |
305,384 |
07-18-2017, 08:32 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
it could be that for the 5268AC the formula is just a little bit different, e.g while we have the formula 2 ^ 32 + 2 for the 599, it could be that the formula for 5268AC is almost the same i.e. 2 ^ 32... |
|
philsmd |
User Contributions
|
182 |
305,384 |
07-24-2017, 01:55 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
why don't you just simple use the .exe file within that repo (yeah, I agree it's very bad to put executable files into source code repositories, but maybe this is a proof that users really have a hard... |
|
philsmd |
User Contributions
|
182 |
305,384 |
07-02-2020, 06:15 PM |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
it should also work with just adding -S to the command line |
|
philsmd |
User Contributions
|
648 |
487,275 |
01-12-2020, 07:10 PM |