Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Epic cracking!
Post: RE: Epic cracking!
@slayerdiangelo I think it has to do with your statement
Quote:
--
even a 20 char long hash can be cracked within minutes
--
Therefore, it was actually you that made this exaggerated claim and o... |
|
philsmd |
hashcat
|
17 |
13,901 |
08-04-2017, 07:46 AM |
|
|
Thread: How hashcat work?
Post: RE: How hashcat work?
It's listed here: https://rocm.github.io/hardware.html
I would recommend that you try ROCm: https://rocm.github.io/ROCmInstall.html
you could also first to try if beta fixes the problem : https:... |
|
philsmd |
hashcat
|
17 |
3,930 |
03-22-2020, 03:17 PM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
it's on the main page: https://github.com/Fist0urs/AxSuite#author |
|
philsmd |
hashcat
|
17 |
2,015 |
08-11-2020, 10:51 AM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
Hey lapolis,
while doing a little more research and searching for AxCrypt related topic on github and the JTR repo, I came across your new github issue on the JTR repo: https://github.com/magnumrippe... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-12-2020, 12:17 AM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
Now you got me wondering which version of AxCrypt hashcat supports. I'm not that much familiar with the AxCrypt implementation and the version covered.
But this question is kind of contradicting: h... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-11-2020, 09:43 AM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
the cost doesn't matter at all. it will change depending on your hardware etc. That's a feature (the user shouldn't wait "too long" for the software to decrypt the files, but it should still be quite ... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-12-2020, 09:04 AM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
Thanks for testing. The new beta is now available that includes the new support for AxCrypt 2: https://hashcat.net/beta/ .
Of course, every upcoming release version greater 6.1.1 will also include th... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-18-2020, 10:55 AM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
I have a nice update for you.
I just took some free time to have a quick glance on the JTR (John The Ripper) implementation of AxCrypt 2 and it seems the algorithm of AxCrypt 2 is pretty straight for... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-11-2020, 02:45 PM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
Well, the user should probably know it. The distinction is quite clear: only paid/premium users get the AES-256 support (at least for the time being, in the current version).
Furthermore, some users ... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-12-2020, 11:51 AM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
The AxCrypt 1 version of hashes that hashcat already supports (-m 13200) is only using AES-128: https://github.com/hashcat/hashcat/blob/6d5e1d3e5d3ed56c245578136cae6ea05ea569dc/OpenCL/m13200-pure.cl#L... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-12-2020, 05:04 PM |
|
|
Thread: AxCrypt v2
Post: RE: AxCrypt v2
okay, I will probably start to implement this, starting with the AES-128 variant.
Not sure how long it will take and if it will be merged into hashcat (and available in beta) soon.
But I will ta... |
|
philsmd |
hashcat
|
17 |
2,015 |
08-14-2020, 11:06 AM |
|
|
Thread: SMF
Post: RE: SMF
After the colon ( : ) is the salt! If you have the salt in a separate file, the only things you could do is either combine each hash w/ every salt or use -e.... BUT: the -e option w/ SMF hashes was *n... |
|
philsmd |
Old hashcat Support
|
16 |
36,790 |
06-17-2013, 05:04 PM |
|
|
Thread: SMF
Post: RE: SMF
We should really focus on the SMF problem here, what you are asking now is very trivial linux stuff. Anyway, paste this one-liner in your shell and you should see how it is combined. Add redirection a... |
|
philsmd |
Old hashcat Support
|
16 |
36,790 |
06-17-2013, 08:43 PM |
|
|
Thread: SMF
Post: RE: SMF
This -e and --remove discussion seems to be kind of offtopic here, but anyway, there was a "non-ideal behaviour" I would say that was very well documented https://hashcat.net/trac/ticket/153 and https... |
|
philsmd |
Old hashcat Support
|
16 |
36,790 |
06-16-2013, 08:09 AM |
|
|
Thread: SMF
Post: RE: SMF
It is just like I said... please believe me, you should append the salt to the hash (separating hash and salt w/ colons, the salt is a normal string, doesn't need to be in hex or something like that).... |
|
philsmd |
Old hashcat Support
|
16 |
36,790 |
06-17-2013, 09:29 PM |
|
|
Thread: how to add custome hash type
Post: RE: how to add custome hash type
Trac is here (https://www.hashcat.net/trac) and you may need to register (https://hashcat.net/trac/register) if not already done (since trac is seperate from the forum and you need to create a new acco... |
|
philsmd |
Old hashcat Support
|
16 |
29,648 |
10-21-2013, 10:18 AM |
|
|
Thread: how to add custome hash type
Post: RE: how to add custome hash type
See https://hashcat.net/wiki/doku.php?id=example_hashes , hashcat supports 2 vbulletin hash modes (both have some restrictions on the salt length etc).
Anyway, by using -m 2611 == vBulletin < v3.8.5... |
|
philsmd |
Old hashcat Support
|
16 |
29,648 |
10-21-2013, 01:27 PM |
|
|
Thread: What kind of hash is this?
Post: RE: What kind of hash is this?
Here it seems to be very easy to find the algorithm... you just need to look for (or have) some known hash:salt:plain tuples.
E.g. this list (hash:salt masked):
1. hash:salt above (231cXXXX18a4cee66X... |
|
philsmd |
General Help
|
16 |
64,375 |
01-03-2014, 02:02 PM |
|
|
Thread: What kind of hash is this?
Post: RE: What kind of hash is this?
Do it like I did:
since there are only pins of length 4 and the range is 0000 - 9999, you can just quickly iterate through this list w/ a few lines of code...
Below are some lines of perl... run it a... |
|
philsmd |
General Help
|
16 |
64,375 |
01-03-2014, 08:30 PM |
|
|
Thread: What kind of hash is this?
Post: RE: What kind of hash is this?
There are several things you need to check...
1. is the input correct, the plist has the fields (salt and hash) base64 encoded, please decode them w/
echo "[saltORhash]" | base64 -d | xxd -p
-> hex e... |
|
philsmd |
General Help
|
16 |
64,375 |
01-15-2014, 02:57 PM |