Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: Floating Mask. How to?
Post: RE: Floating Mask. How to?
What you (@agenta) should consider is that this "floating technique" in theory is efficient/meaningful/clever only if the (different) charsets you are using (in your specific case there are 2, ?a and ... |
|
philsmd |
General Talk
|
8 |
11,643 |
03-01-2016, 12:43 PM |
|
|
Thread: hashcat-3.00 - potfile behavior / ignored ?
Post: RE: hashcat-3.00 - potfile behavior / ignored ?
Well, guess it is already too late to create an issue. But good news, it seems we already fixed the problem: see https://github.com/hashcat/hashcat/pull/419
Thanks for reporting (and please test to m... |
|
philsmd |
hashcat
|
8 |
11,437 |
07-06-2016, 10:11 AM |
|
|
Thread: hashcat-3.00 - potfile behavior / ignored ?
Post: RE: hashcat-3.00 - potfile behavior / ignored ?
I'm not able to reproduce this new problem, regardless of what I try (potfile full of hashes, crap etc).
Seems that we now really need a github issue with full steps and examples that guide us to r... |
|
philsmd |
hashcat
|
8 |
11,437 |
07-07-2016, 12:38 PM |
|
|
Thread: Hashcat 3 (from git) and OSX
Post: RE: Hashcat 3 (from git) and OSX
From the --help output:
Code:
--
-D, --opencl-device-types
--
and yes both just single device types e.g. -D 1 and also multiple device types e.g. -D 1,2 is possible |
|
philsmd |
hashcat
|
8 |
8,384 |
07-11-2016, 02:31 PM |
|
|
Thread: Hashcat 3 (from git) and OSX
Post: RE: Hashcat 3 (from git) and OSX
Why do you say you (quote : ) "can't use CPU only" ? This is exactly what -D 1 does (with support from your CPU OpenCL driver).
BTW: it's also possible to use hashcat-legacy - formerly called "cpu has... |
|
philsmd |
hashcat
|
8 |
8,384 |
07-13-2016, 08:00 AM |
|
|
Thread: Custom Ruleset, Correct word but exhausted
Post: RE: Custom Ruleset, Correct word but exhausted
I discovered several problems here:
1. This command makes absolutely no sense:
Code:
--
hashcat64.exe -w 1 -m 2500 -a 0 -r rules\mine.rule C:\Pen\hs\mywifi.hccap C:\Pen\word\test.txt --stdout --gpu... |
|
philsmd |
hashcat
|
8 |
8,308 |
08-25-2016, 08:37 AM |
|
|
Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Using for Axcrypt
My guess is that you should just use the correct python version and therefore:
you do not need to change the .py file at all.
With "the correct" version of python it should work without problems.
... |
|
philsmd |
hashcat
|
8 |
7,831 |
08-08-2017, 04:07 PM |
|
|
Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Axcrypt: axcrypt2john.py (how to use python)
I understand that it's not your day to day job to develop or run code, but you should at least try to do some research and think about it.
This is not that difficult at all. There are literally thous... |
|
philsmd |
hashcat
|
8 |
7,831 |
08-08-2017, 09:37 PM |
|
|
Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash
The short answer is: I/O
You shouldn't underestimate how slow it is to read from disk compared to e.g. generating the password candidates with rule/mask engine directly on GPU (fast hashes).
For slo... |
|
philsmd |
hashcat
|
8 |
21,165 |
09-02-2017, 08:40 AM |
|
|
Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash
As already mentioned above, the hash algorithm itself determines where/how the password candidates are generated for mask attacks (-a 3).
The hashcat source code distinguishes between ATTACK_EXEC_INS... |
|
philsmd |
hashcat
|
8 |
21,165 |
09-03-2017, 07:33 PM |
|
|
Thread: Benchmark selection
Post: RE: Benchmark selection
Maybe VeraCrypt (in addition to TrueCrypt or as replacement for TrueCrypt) would make sense.
I think also some MS office modes could make sense within the reduced list, because it's also used a lot b... |
|
philsmd |
hashcat
|
8 |
9,943 |
10-28-2017, 01:51 PM |
|
|
Thread: Adding 4 digit variable number to Name wordlist
Post: RE: Adding 4 digit variable number to Name wordlis...
Code:
--
for i in {1722..2017}; do echo $i | sed 's/\(.\)/\$\1 /g'; done > rules/add_year.rule
--
|
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
8,777 |
11-30-2017, 10:18 PM |
|
|
Thread: Adding 4 digit variable number to Name wordlist
Post: RE: Adding 4 digit variable number to Name wordlis...
Yeah, that's true my example was targeted for linux/mac users that use a bash-compatible shell.
That said, you can extend the idea to any other environment or tool (yes you could also do it all wit... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
8,777 |
12-05-2017, 01:57 PM |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
If you have an encrypted wallet.dat file, you should run bitcoin2john.py with it.
The resulting hash (without file names, remove the file names and colons from the output of bitcoin2john.py if any ... |
|
philsmd |
General Talk
|
8 |
7,223 |
01-04-2018, 01:27 PM |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
That's actually really fast for such a huge keyspace.
For instance, if you have 10 GPUs, it would only take you a single year (if we assume the worst case. 6 month on average)!
Again, brute-force ... |
|
philsmd |
General Talk
|
8 |
7,223 |
01-05-2018, 10:28 AM |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
no. You can't use the wallet.dat file directly. You need to download bitcoin2john.py (from https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/bitcoin2john.py) and run it w... |
|
philsmd |
General Talk
|
8 |
7,223 |
01-04-2018, 09:05 PM |
|
|
Thread: VTC Vertcoin wallet passphrase lost need help
Post: RE: VTC Vertcoin wallet passphrase lost need help
no, I don't think that a mask attack with a charset of ?a in each position is a good strategy.
Since -m 11300 is a slow hashing algorithm I would recommend to remember as much as possible from the ... |
|
philsmd |
General Talk
|
8 |
7,223 |
01-05-2018, 09:37 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
Well, there is no secret at all. The neo code is open source and even already linked above.
Here for instance is the verify function:
https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 10:08 AM |
|
|
Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password
How do you know that it doesn't duplicate whenever the length is greater than 15? How did you test it?
if I run something like this:
Code:
--
echo abcdefghijklmnopqrstuvwxyz | hashcat --stdout ... |
|
philsmd |
hashcat
|
8 |
6,282 |
03-02-2018, 10:14 AM |