Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Output format
Post: RE: Output format
yes, the hash file must contain the username.
1st step you crack the hashes by using the --username switch
2nd step you show the hashes with -m x --show --username original_hash_file_with_usernames.t... |
|
philsmd |
General Talk
|
1 |
7,897 |
11-16-2014, 07:05 PM |
|
|
Thread: Help identifying hash type!
Post: RE: Help identifying hash type!
According to the forum rules, which you have accepted, you are not allowed to post hashes.
See https://hashcat.net/forum/announcement-2.html
Please take a week off and re-read the forum rules. They a... |
|
philsmd |
General Help
|
1 |
4,113 |
12-11-2014, 12:55 PM |
|
|
Thread: Wordlists Contain 0 Bytes?
Post: RE: Wordlists Contain 0 Bytes?
You have specified "-a 3" this means cpu hashcat will use a mask attack (https://hashcat.net/wiki/doku.php?id=mask_attack ).
If you instead want to use a wordlist-based attack, you need to specify -a ... |
|
philsmd |
Old hashcat Support
|
1 |
3,909 |
01-01-2015, 12:02 PM |
|
|
Thread: possible bug in ?a on 1.31
Post: RE: possible bug in ?a on 1.31
Maybe you can give the whole command line and tell us some example passwords which should be found.
Also, when you specify --increment (or short -i) you should also always specify the --increment-min... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,344 |
12-17-2014, 01:24 PM |
|
|
Thread: Hardware suggest
Post: RE: Hardware suggest
mac/OS X is only supported by cpu hashcat ( https://hashcat.net/hashcat/ ), windows/linux instead are supported by all cats (cpu hashcat, cudaHashcat, oclHashcat).
Yes, the GPU may be faster than you... |
|
philsmd |
Hardware
|
1 |
4,722 |
01-08-2015, 03:26 PM |
|
|
Thread: 2 salt problem
Post: RE: 2 salt problem
As far as I've understood your hash type is
md5 ($salt1 . $pass . $salt2)
I also assume here that you are attacking a single hash only.
There are many other attacks that may or may not work faster.... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,642 |
01-14-2015, 03:23 PM |
|
|
Thread: Help with output
Post: RE: Help with output
Unfortunately cpu hashcat doesn't support --username together with --show/--left/--remove yet.
That means, if you use --username with --remove, the user names won't end up in the new/modified hash li... |
|
philsmd |
Old hashcat Support
|
1 |
4,607 |
01-20-2015, 08:37 PM |
|
|
Thread: input file format
Post: RE: input file format
According to the forum's rules you are not allowed to post hashes!
Read the rules here: https://hashcat.net/forum/announcement-2.html
I give you 1 week to read them. After the week you might be mo... |
|
philsmd |
General Help
|
1 |
5,098 |
01-22-2015, 07:16 PM |
|
|
Thread: Hired Help?
Post: RE: Hired Help?
Yes, these requests are not allowed here.
Furthermore, hashcat is about offline cracking (vs online cracking that you "want").
And of course, the solution for your problem is to not even think abo... |
|
philsmd |
General Help
|
1 |
3,723 |
01-26-2015, 11:25 AM |
|
|
Thread: decryption mechanism in wpa & wpa2
Post: RE: decryption mechanism in wpa & wpa2
the answer is
4. it uses markov chains (so not really random) if you didn't use --markov-disable
EDIT: btw this has not specifically to do only with wpa; markov chains are enabled for every hash ty... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,929 |
01-26-2015, 11:28 AM |
|
|
Thread: Dreaded 209 error
Post: RE: Dreaded 209 error
Afaik this error could also occur if you did not extract the oclHashcat .7z archive correctly.
You should use something like 7zip on windows and unzip the .7z with this software.
After that you ne... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,875 |
02-18-2015, 12:02 PM |
|
|
Thread: How to crack a password in this way with hashcat ?
Post: RE: How to crack a password in this way with hashc...
This trac ticket https://hashcat.net/trac/ticket/539 seems to be related to your question.
The main reasons it wasn't implemented yet, was that the full details about the maximum length devs should... |
|
philsmd |
Old hashcat Support
|
1 |
4,407 |
03-26-2015, 11:50 AM |
|
|
Thread: Doesn't create output file
Post: RE: Doesn't create output file
The answer is: this happens because you already did crack this specific hash and it was already in your .pot file (see the warning "INFO: removed 1 hash found in pot file"), hence oclHashcat does not ... |
|
philsmd |
Old oclHashcat Support
|
1 |
4,278 |
03-27-2015, 05:19 PM |
|
|
Thread: Is it a MD5 hash?
Post: RE: Is it a MD5 hash?
1. you should be very careful to post hashes here, because it is not allowed according to the forum rules, see for instance https://hashcat.net/forum/announcement-2.html
2. since you provided the plai... |
|
philsmd |
General Talk
|
1 |
4,620 |
04-04-2015, 06:49 PM |
|
|
Thread: .NET Webapplication
Post: RE: .NET Webapplication
Can't you just replace the "hash" with one you know the password for.
I.e. you generate a new "hash" using a simple password and check if you can login etc.
What I mean is, in such situations you ... |
|
philsmd |
General Talk
|
1 |
5,173 |
04-27-2015, 09:49 PM |
|
|
Thread: What's wrong? [noob]
Post: RE: What's wrong? [noob]
Code:
--
Hash 'hash.hash': Line-length exception
--
.... this means that the file hash.hash was not found and oclHashcat did try to load the parameter "hash.hash" as a hash (directly specified ... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,531 |
06-05-2015, 03:30 AM |
|
|
Thread: NTLM v2
Post: RE: NTLM v2
Your forum post is against the rules https://hashcat.net/forum/announcement-2.html
"Do not ask people to crack your hash. It does not matter if you are willing to pay." |
|
philsmd |
Old oclHashcat Support
|
1 |
3,629 |
06-17-2015, 07:53 AM |
|
|
Thread: Combine User:hash:salt with Hash:salt:passwords
Post: RE: Combine User:hash:salt with Hash:salt:password...
How to do this was explained dozens of times on the forum and it was even added in the frequently asked question (FAQ) wiki page because of users asking the same question again and again:
https://h... |
|
philsmd |
General Help
|
1 |
4,070 |
07-13-2015, 02:36 PM |
|
|
Thread: Regarding to OS X v10.7/8/9
Post: RE: Regarding to OS X v10.7/8/9
for -m 1722: sha512 ($salt.$pass)
for -m 7100: PBKDF2-HMAC-SHA512
you can find this information all around the web. It is not a secret. |
|
philsmd |
General Help
|
1 |
3,510 |
10-22-2015, 12:29 PM |
|
|
Thread: input file format
Post: RE: input file format
You can find the hash format for all the supported hash types here: https://hashcat.net/wiki/doku.php?id=example_hashes |
|
philsmd |
Old hashcat Support
|
1 |
13,283 |
11-05-2015, 10:27 AM |