Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Parameters for crack ETH wallet password
Post: RE: Parameters for crack ETH wallet password
before starting a long running cracking job I would suggest to first make sure that your restrictions about the password candidates are correct and that your expected/test password candidates are even... |
|
philsmd |
hashcat
|
4 |
3,253 |
09-30-2018, 09:12 AM |
|
|
Thread: brain-server
Post: RE: brain-server
there was a problem with starting the hashcat brain with version 5.0.0 on windows (see https://github.com/hashcat/hashcat/issues/1738#issuecomment-434274579).
This problem is already fixed and the la... |
|
philsmd |
hashcat
|
4 |
4,680 |
11-19-2018, 11:46 AM |
|
|
Thread: Won't start cracking (beginner)
Post: RE: Won't start cracking (beginner)
are you sure you installed the driver correctly? please use these instructions:
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#i_may_have_the_wrong_driver_installed_what_should_i_do
... |
|
philsmd |
Hardware
|
4 |
3,801 |
11-25-2018, 09:56 PM |
|
|
Thread: hashcat iconv
Post: RE: hashcat iconv
if I generate a md5 hash with your input $HEX[706f657a6965] I get a completely separate result:
Code:
--
printf "po\xebzie" |iconv -f "iso8859-1" -t "ASCII//TRANSLIT" | md5sum
5453454a253f8840811... |
|
philsmd |
hashcat
|
4 |
2,981 |
12-07-2018, 01:25 PM |
|
|
Thread: hashcat iconv
Post: RE: hashcat iconv
well, I'm still not sure if 278fbfac8b69dda968b190e6bb1f4ac9 is the correct hash for your plain. I guess you do not know the password at all (which is bad since it would be a reason to ban you, but I'... |
|
philsmd |
hashcat
|
4 |
2,981 |
12-07-2018, 06:40 PM |
|
|
Thread: clGetPlatformIDs(): CL_PLATFORM_NOT_FOUND_KHR problem
Post: RE: clGetPlatformIDs(): CL_PLATFORM_NOT_FOUND_KHR ...
please follow this guide https://hashcat.net/faq/wrongdriver |
|
philsmd |
hashcat
|
4 |
9,115 |
12-19-2018, 04:19 PM |
|
|
Thread: helpme ^^)
Post: RE: helpme ^^)
hashes were removed. users were banned. follow the forum rules. damnit
see https://hashcat.net/forum/announcement-2.html |
|
philsmd |
hashcat
|
4 |
2,380 |
01-05-2019, 05:10 PM |
|
|
Thread: What make the hashrate so huge different?
Post: RE: What make the hashrate so huge different?
well, hccapx files as you can see here https://hashcat.net/wiki/doku.php?id=hccapx can consist of several networks/handshakes etc. if you crack several networks at the same time with -m 2500 = WPA/WPA... |
|
philsmd |
hashcat
|
4 |
2,716 |
01-15-2019, 07:05 PM |
|
|
Thread: Need help on cracking veracrypt hidden partition
Post: RE: Need help on cracking veracrypt hidden partiti...
[update]: undeath was once again faster to answer the questions. he of course gives very good advice so read his suggestions too. I will leave my reply here anyways, maybe it adds just a little bit mo... |
|
philsmd |
hashcat
|
4 |
2,770 |
12-31-2018, 11:57 AM |
|
|
Thread: Hashcat failing when hashes.txt has multiple different hashes in it
Post: RE: Hashcat failing when hashes.txt has multiple d...
as the above mentioned wiki post explains, you need to use --show --username and the original hash lists:
Code:
--
hashcat -m x --show --username hashes.txt
--
where x must be replaced with th... |
|
philsmd |
hashcat
|
4 |
2,495 |
01-18-2019, 09:58 AM |
|
|
Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example
Post: RE: Help explain the PBKDF2-HMAC-SHA1 hash-example
the format is:
sha1:[iteration count]:[salt in base64]:[digest in base64]
therefore the hash is:
sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY=
this can be cracked with:
Code:
--
hashcat ... |
|
philsmd |
hashcat
|
4 |
2,620 |
02-11-2019, 10:59 PM |
|
|
Thread: Extract all passwords from potfile
Post: RE: Extract all passwords from potfile
that's incorrect.
--show only considers the hashes matching the current hash type and hash list (hash.txt):
Code:
--
hashcat -m 0 --show --outfile-format 2 hash.txt
--
|
|
philsmd |
hashcat
|
4 |
3,187 |
02-16-2019, 03:34 PM |
|
|
Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512
1. why are you trying to crack the hash? can't you just replace the hash with a known hash and login ? Is it important that you know the password ?
2. your rule command/syntax is completely wrong. yo... |
|
philsmd |
hashcat
|
4 |
3,707 |
02-20-2019, 10:07 AM |
|
|
Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512
1. what is your goal here? do you need to do forensic analysis or just need to get your data back and login ? I think if you are not using full-disk-encryption you could trick the system by giving it ... |
|
philsmd |
hashcat
|
4 |
3,707 |
02-20-2019, 10:52 PM |
|
|
Thread: Command error
Post: RE: Command error
I think this is a problem of quotation marks "" vs ''
I think windows only accepts "" as quotation for parameters
The normal hashcat command is like this:
Code:
--
hashcat64.exe -m 14800 -... |
|
philsmd |
hashcat
|
4 |
2,207 |
03-21-2019, 01:49 PM |
|
|
Thread: What am I doing wrong here?
Post: RE: What am I doing wrong here?
well, you also need to show us your command line and mask file. without that we can't really understand what you are doing over there. |
|
philsmd |
hashcat
|
4 |
2,202 |
04-04-2019, 07:35 PM |
|
|
Thread: What am I doing wrong here?
Post: RE: What am I doing wrong here?
you need to define the custom charset within the mask file, see https://hashcat.net/faq#what_is_a_hashcat_mask_file and https://hashcat.net/wiki/?id=mask_attack#hashcat_mask_files
therefore the com... |
|
philsmd |
hashcat
|
4 |
2,202 |
04-04-2019, 07:53 PM |
|
|
Thread: Toogle case generator problem
Post: RE: Toogle case generator problem
you can toogle all 10 (0-9) + 26 (A-Z) = 36 positions (from index 0 to 35) with the following rules
T0 T1 T2 T3 T4 T5 T6 T7 T8 T9 TA TB TC TD TE TF TG TH TI TJ TK TL TM TN TO TP TQ TR TS TT TU
TV ... |
|
philsmd |
hashcat
|
4 |
2,028 |
04-05-2019, 10:35 PM |
|
|
Thread: PBKDF2 and SHA-1 question
Post: RE: PBKDF2 and SHA-1 question
https://github.com/hashcat/hashcat/blob/773dab91616df1088b5887623547ab2bde80d9ba/tools/test_modules/m16800.pm#L40-L58
256 bits are 32 bytes (32 * 8 = 256) |
|
philsmd |
hashcat
|
4 |
2,385 |
04-06-2019, 10:58 PM |
|
|
Thread: Slow bcrypt
Post: RE: Slow bcrypt
the cost factor is encoded in the hash
The example hash for instance starts with "$2a$05$" (hashcat -m 3200 --example-hashes) and therefore has an exponent of 5 (cost factor) and therefore uses 2^... |
|
philsmd |
hashcat
|
4 |
2,604 |
04-15-2019, 12:17 PM |