Search Results
|
Post |
Author |
Forum |
Replies
[desc]
|
Views |
Posted |
|
|
Thread: how to take hash with winrar?
Post: RE: how to take hash with winrar?
For -m 12500 = RAR3-hp the hashes must start with $RAR3$*0*
if you have a $RAR3$*1* hash (i.e. a rar file without encrypted file names) instead, it is not supported, see https://github.com/hashcat... |
|
philsmd |
hashcat
|
8 |
11,898 |
08-06-2018, 05:51 PM |
|
|
Thread: Is this WPA password cracked?
Post: RE: Is this WPA password cracked?
that's not 100% correct, Mem5
Exhausted could happen if only some of the handshakes are cracked and not all of them.
but if all "hashes" are cracked, the status will be "Cracked".
The problem w... |
|
philsmd |
hashcat
|
8 |
4,181 |
01-05-2019, 02:30 PM |
|
|
Thread: Help with policygen/maskprocessor to create hcmask
Post: RE: Help with policygen/maskprocessor to create hc...
I literally just wrote what you should do for point #3
use maskprocessor with -q 2 as explained in my command above. |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
5,806 |
01-26-2019, 04:11 PM |
|
|
Thread: Help with policygen/maskprocessor to create hcmask
Post: RE: Help with policygen/maskprocessor to create hc...
maskprocessor has an option for #3, see mp64 --help output:
Code:
--
-q, --seq-max=NUM Maximum number of multiple sequential characters
--
for #2 instead you need to generate some k... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
5,806 |
01-26-2019, 12:44 PM |
|
|
Thread: Help with policygen/maskprocessor to create hcmask
Post: RE: Help with policygen/maskprocessor to create hc...
the hashcat forum software (CMS) uses mybb. The mybb community/devs implemented the password reset mechanism with a temporary password. It's not your original password. The original password is stored... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
8 |
5,806 |
01-26-2019, 11:03 PM |
|
|
Thread: I lost my second password blockchain.com.
Post: RE: I lost my second password blockchain.com.
I close this thread because it's getting ridiculous.
private mail addresses and advertisement of scammy (sounding) cryptocurrency wallet recovery services. This is not a forum where you post ads like... |
|
philsmd |
hashcat
|
8 |
4,091 |
02-28-2019, 04:27 PM |
|
|
Thread: I lost my second password blockchain.com.
Post: RE: I lost my second password blockchain.com.
Well, as you should already know by registering to this forum, it is not allowed to post hashes (https://hashcat.net/forum/announcement-2.html). It's a reason to ban you. In this case it's even worse ... |
|
philsmd |
hashcat
|
8 |
4,091 |
02-23-2019, 10:51 AM |
|
|
Thread: iTunes backup crack too slow
Post: RE: iTunes backup crack too slow
in this case it depends heavily on the iteration count. this information is stored/present within the hash itself.
the hash used within the benchmark uses 10000 iterations (iter) and 1000 iteration... |
|
philsmd |
hashcat
|
8 |
3,798 |
03-12-2019, 12:01 PM |
|
|
Thread: iTunes backup crack too slow
Post: RE: iTunes backup crack too slow
that's interesting.
I'm not sure if we should change it though. One problem of changing a benchmark setting is always that users start comparing apple to oranges after the change (and they say "hey... |
|
philsmd |
hashcat
|
8 |
3,798 |
03-13-2019, 09:47 AM |
|
|
Thread: Diskcryptor password
Post: RE: Diskcryptor password
well, we had a similar request from here: https://hashcat.net/forum/thread-8012.html
and I tried to patch hashcat v5.1.0 (with commit: 1493bc01cfbf3fe0b7f4f639e43813f590439a4d) a little bit to sup... |
|
philsmd |
hashcat
|
8 |
4,266 |
03-24-2019, 07:42 PM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA1 How to get digest value in `Byte` format?
I think it makes sense to explain the problem with some exampes too.
just an example, maybe not applicable to your problem at all:
"I want to convert 0x01020304 to 0x04030201"
"I want to conver... |
|
philsmd |
hashcat
|
8 |
3,509 |
03-30-2019, 10:00 AM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...
the u32 and u8 are primitive types, you can simply cast an array of 4-byte integers to an array with 1-byte chars/bytes.
Code:
--
u8 * bytes = (u8 *) digest32;
--
or copy them directly
C... |
|
philsmd |
hashcat
|
8 |
3,509 |
03-30-2019, 11:50 AM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...
The length of a normal sha256 hash is 64 hexadecimal characters and therefore 32 raw bytes. You are trying to use 4 ints of 4 bytes = 4 * 4 = 16 bytes. That's only half the bytes of the full hash. |
|
philsmd |
hashcat
|
8 |
3,509 |
03-31-2019, 07:31 PM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...
no, it's 8 ints (all of which are 4 bytes), see https://github.com/hashcat/hashcat/blob/319bf80178e946f3b833aea3daefe3ddbfde51c2/OpenCL/inc_hash_sha256.h#L64 |
|
philsmd |
hashcat
|
8 |
3,509 |
04-01-2019, 08:35 AM |
|
|
Thread: Diskcryptor password
Post: RE: Diskcryptor password
The first step, i.e. implementing the basic DiskCryptor AES module + kernel + test was successfully done: see https://github.com/hashcat/hashcat/commit/60c255a69dd007c02c6514496fe99fce891dae22 and htt... |
|
philsmd |
hashcat
|
8 |
4,266 |
04-07-2019, 08:37 PM |
|
|
Thread: Diskcryptor password
Post: RE: Diskcryptor password
with our latest commit https://github.com/hashcat/hashcat/commit/8f62085ea49d19a2f0e0bebf1ee5ad27f4e51210 we added the support for all the 7 combinations of aes/twofish/serpent (3 pure, 3 with 2 algos... |
|
philsmd |
hashcat
|
8 |
4,266 |
04-08-2019, 07:49 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
see:
https://hashcat.net/forum/thread-6638.html
https://hashcat.net/forum/thread-2563-post-15255.html#pid15255 |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 02:43 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 08:26 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
maybe you just didn't understand the posts.
depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600.
... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 07:27 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
I guess this is just because you didn't test with the correct password candidate.
hashcat only tries the passwords that you tell it to run.
Maybe this specific hash is harder to crack and you need... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-19-2019, 11:44 AM |