Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: SHA-256 64 char password
Post: RE: SHA-256 64 char password
infeasible. (26+10) ^ 64 = 4011991914547630480065053387702443812690402487741812225955731622655455723258857248542161222254985216 |
|
philsmd |
hashcat
|
2 |
574 |
05-26-2020, 09:48 PM |
|
|
Thread: Beta and driver
Post: RE: Beta and driver
great, thanks for update.
Problem fixed :)
thread closed |
|
philsmd |
hashcat
|
2 |
591 |
06-11-2020, 07:12 PM |
|
|
Thread: Heat problem and more - new ASUS laptop with a Ryzen 7 processor
Post: RE: Heat problem and more - new ASUS laptop with a...
the best thing probably would be to not use laptops for these intensive cracking purposes. second thing could be to just use your CPU (install the Intel OpenCL Runtime for Intel Core and Xeon processo... |
|
philsmd |
hashcat
|
2 |
543 |
06-11-2020, 09:36 PM |
|
|
Thread: Threadripper not found
Post: RE: Threadripper not found
intall the Intel OpenCL Runtime for Core and Xeon Processors from https://software.intel.com/content/www/us/en/develop/articles/opencl-drivers.html#cpu-section |
|
philsmd |
hashcat
|
2 |
596 |
06-20-2020, 05:35 PM |
|
|
Thread: Hashcat table of hashes
Post: RE: Hashcat table of hashes
Code:
--
hashcat --help
--
or:
Code:
--
hashcat --example-hashes
--
or:
https://hashcat.net/wiki/doku.php?id=example_hashes |
|
philsmd |
hashcat
|
2 |
583 |
06-24-2020, 09:19 AM |
|
|
Thread: Restoring a WPA session from hashcat 5.1.0 in 6.0.0?
Post: RE: Restoring a WPA session from hashcat 5.1.0 in ...
You could be lucky since the data itself that is stored was not changed directly (actually never changed for years, exactly for "compatibility reasons"... but see reason for updated versoin below), se... |
|
philsmd |
hashcat
|
2 |
664 |
06-17-2020, 03:08 PM |
|
|
Thread: NTLMv2 separator unmatched
Post: RE: NTLMv2 separator unmatched
no, -m 5600 is a diffrent format.
the pwdump is supported with -m 1000 = NTLM and -m 3000 = LM (also see https://openwall.info/wiki/john/hash-formats and https://ftp.samba.org/pub/samba/pwdump/READ... |
|
philsmd |
hashcat
|
2 |
607 |
06-27-2020, 10:28 AM |
|
|
Thread: compiling a reduced wordlist .ccp
Post: RE: compiling a reduced wordlist .ccp
some answers already given here: https://hashcat.net/forum/thread-6170-post-49424.html#pid49424
Maybe it's better to just explain what you ultimate goal is ?
Does it even have to do with WPA2 ha... |
|
philsmd |
General Talk
|
2 |
659 |
07-03-2020, 10:28 AM |
|
|
Thread: Is hccap Support Intentionally Dropped in V6?
Post: RE: Is hccap Support Intentionally Dropped in V6?
I'm also confused here. Well, we need to distinguish 2 different cases:
1. you are really refering to hccap (without the x at the end)
2. you mean the new -m 22000 = WPA-PBKDF2-PMKID+EAPOL compared ... |
|
philsmd |
hashcat
|
2 |
577 |
06-25-2020, 06:59 PM |
|
|
Thread: Zip to Hashcat
Post: RE: Zip to Hashcat
winzip (-m 13600 ) and pkzip (-m 172xx) are very different hash types.
The data limit that hashcat supports for PKZIP hashes is currently about 320 KB, see: https://github.com/hashcat/hashcat/pull/... |
|
philsmd |
hashcat
|
2 |
728 |
06-27-2020, 03:24 PM |
|
|
Thread: ATTENTION! OpenCL kernel self-test failed on Mac
Post: RE: ATTENTION! OpenCL kernel self-test failed on M...
1. the hash type (-m) is important when you report any errors (self-test errors are often "only" affecting specific hash types, because of a driver/runtime/compiler bug, not hashcat problem most of th... |
|
philsmd |
hashcat
|
2 |
582 |
07-13-2020, 10:28 AM |
|
|
Thread: hashcat mask
Post: RE: hashcat mask
first of all it's infeasible to brute-force (and in most cases also mask attack) a hash with a password that is very long and random. It's mathematically imposiible. NOT doable. just do the math (hint... |
|
philsmd |
hashcat
|
2 |
568 |
07-19-2020, 10:28 AM |
|
|
Thread: Hashcat doesn't consider the added chars from rules
Post: RE: Hashcat doesn't consider the added chars from ...
use this:
Code:
--
-S
--
within your command, see: https://hashcat.net/forum/thread-8960-post-47574.html#pid47574 |
|
philsmd |
hashcat
|
2 |
488 |
07-24-2020, 05:36 PM |
|
|
Thread: Sha512(pass.salt), 128char salt.
Post: RE: Sha512(pass.salt), 128char salt.
did you try -m 1710 = sha512($pass.$salt) ?
see https://hashcat.net/wiki/doku.php?id=example_hashes
there are some differences with length limits between optimized (using -O) and pure kernels (... |
|
philsmd |
hashcat
|
2 |
505 |
07-31-2020, 10:22 PM |
|
|
Thread: Precomputing salt / debugging module files
Post: RE: Precomputing salt / debugging module files
Thank you very much for the hint about -m 21200 (which wasn't optimized to compute sha1($salt) within the host code once and only once per hash). I've suggested the change here and it was merged: http... |
|
philsmd |
hashcat
|
2 |
713 |
07-29-2020, 09:27 PM |
|
|
Thread: Brute Forcing LM/NTLM with non ASCII Characters
Post: RE: Brute Forcing LM/NTLM with non ASCII Character...
if you want to change kernel files that are using sha512_update_global_utf16le_swap into kernel files that use sha512_update_global_swap (without utf16le), you would need to change it for every attack... |
|
philsmd |
hashcat
|
2 |
538 |
07-31-2020, 04:35 PM |
|
|
Thread: hashcat found MD5 plaintext but it is not correct not sure why
Post: RE: hashcat found MD5 plaintext but it is not corr...
first of all, it's not allowed to post hashes here, see: https://hashcat.net/forum/announcement-2.html
You will get banned for this action from this forum. There is kind of a zero tolerance policy,... |
|
philsmd |
hashcat
|
2 |
474 |
08-01-2020, 09:22 AM |
|
|
Thread: MD5 mask cracking - exhausted/different result each time
Post: RE: MD5 mask cracking - exhausted/different result...
very bad. we call this false positive (or just a wrong result)..
just try with -D 1 , it will work perfectly fine.
it seems to be a driver problem, because the same code works on each and every ... |
|
philsmd |
hashcat
|
2 |
485 |
08-05-2020, 03:47 PM |
|
|
Thread: Location of restore file
Post: RE: Location of restore file
what's your operating system ?
The restore file is named after your session e.g. with default "hashcat" session, it's just hashcat.restore.
By default it's stored in the hashcat folder, e.g. if ... |
|
philsmd |
hashcat
|
2 |
460 |
08-06-2020, 08:44 AM |
|
|
Thread: salt+password md5
Post: RE: salt+password md5
the format is:
Code:
--
hash:salt
--
see https://hashcat.net/wiki/example_hashes
so it's the other way around.
It's not allowed to post hashes here, see: https://hashcat.net/forum/announ... |
|
philsmd |
hashcat
|
2 |
432 |
08-13-2020, 11:55 PM |