Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
I'm pretty sure this is a known problem with how the OpenCL kernels use utf16 chars.
As far as I know, the kernel code (also for performance reasons) for utf16le encoding is very "elementary" and j... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-13-2019, 09:54 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
yep yep yep
that's how the algorithm works (and actually most of the microsoft-invented algos),
also see this perl module to understand the algo: https://github.com/hashcat/hashcat/blob/d1f473d6... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-18-2019, 12:01 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
you can try it yourself
create a clean directory with the hashcat download/binaries (e.g. from https://hashcat.net/beta or github or even release should work). make sure that the "kernels/" directo... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-21-2019, 11:08 PM |
|
|
Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...
hmm, interesting. is there something like clinfo or even another common OpenCL-based benchmarking tool for windows that we can compare with ?
note: here (bottom of that page) I see 64 bit binaries fo... |
|
philsmd |
hashcat
|
10 |
3,347 |
10-08-2019, 10:47 AM |
|
|
Thread: does not see the second processor 48 cores/ see only 24 cores
Post: RE: does not see the second processor 48 cores/ se...
please be more specific: which OpenCL program are you talking about ? (you can't really compare it with a program that doesn't use OpenCL)
also, did you try clinfo ? |
|
philsmd |
hashcat
|
10 |
3,347 |
10-17-2019, 07:35 PM |
|
|
Thread: Low Hashrate
Post: RE: Low Hashrate
are you talking about hashes per second H/s , because Hz is something completely differnt (core clock, frequency for instance).
speed depends a lot on the attack mode and sometimes even how many ha... |
|
philsmd |
hashcat
|
10 |
3,249 |
11-10-2019, 05:21 PM |
|
|
Thread: Integer overflow detected
Post: RE: Integer overflow detected
try the beta from https://hashcat.net/beta |
|
philsmd |
hashcat
|
10 |
2,734 |
01-29-2020, 03:03 PM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
I don't think the grep test is a good/valid test.
There could be any other (even non-printable) character within that line and therefore the combined (concatenated) result is different.
You coul... |
|
philsmd |
hashcat
|
10 |
2,085 |
03-26-2020, 06:31 PM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
This command:
Code:
--
xxd -p
--
... unfortunately adds newlines within the hexadecimal output if a certain line line was reached. Try it yourself
Code:
--
echo -n aaaaaaaaaaaaaaaaaaaaaa... |
|
philsmd |
hashcat
|
10 |
2,085 |
03-27-2020, 09:53 AM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
Can you try cracking your hccapx file with -m 2500 (for testing purposes) ? |
|
philsmd |
hashcat
|
10 |
2,085 |
03-27-2020, 09:56 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
yeah, in the help output:
Code:
--
hashcat --help
--
you will see all the TrueCrypt hash types (several variants depending on bit length and hash used + variants for boot volumes)
BTW: the ... |
|
philsmd |
General Talk
|
10 |
2,590 |
05-31-2020, 08:46 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
just one simple thing you could and should do. create a similar container with known password (it could be similar to the one you are trying to crack, just remember always that this is just a test and... |
|
philsmd |
General Talk
|
10 |
2,590 |
06-15-2020, 08:52 AM |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
What do you mean by "I'm now able to run the attack" ?
Are you able to crack hashes that you have generated as a test ? Did you try to crack the example hash from https://hashcat.net/wiki/example_h... |
|
philsmd |
General Talk
|
10 |
2,590 |
06-18-2020, 12:50 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
no, mask attack would be MUCH, MUCH faster if you just try "random passwords". every operation involving the disk would slow it down tremendously as already explained above when we compared -a 3 with ... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:28 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
mask attack: the candidates are directly generated/used on GPU, within the GPU kernel code
attack involving dictionaries (-a 0, -a 1, -a 6, -a 7): disk I/O bottleneck AND passwords need to be "send"/... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-06-2020, 12:41 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
if you have some specific idea, you could also develop/program your own password generator (for instance a python script or whatever) and pass the candidates to hashcat like this:
Code:
--
pytho... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:33 AM |
|
|
Thread: hashcat v6.1.0
Post: RE: hashcat v6.1.0
kkost: the unit tests of hashcat is a perl + shell script framework that tests if the hash types work correctly (even salt and pass of mininum and maximum length etc). It generates random hashes and v... |
|
philsmd |
hashcat
|
10 |
4,018 |
07-29-2020, 08:23 AM |
|
|
Thread: 7z 11600 hash file
Post: RE: 7z 11600 hash file
Why do you use --force in your command line ? That's probably the biggest problem here.
I didn't really understand what error you get. It's normal that a benchmark runs very quickly, it just tests ... |
|
philsmd |
hashcat
|
10 |
1,330 |
07-31-2020, 04:42 PM |
|
|
Thread: 7z 11600 hash file
Post: RE: 7z 11600 hash file
either use:
Code:
--
hashcat -m 11600 -a 3 -w 3 --increment --increment-min 8 hash.txt myword?d?d?d?d?d?d
--
or
Code:
--
hashcat -m 11600 -a 6 -w 3 --increment --increment-min 2 hash.txt... |
|
philsmd |
hashcat
|
10 |
1,330 |
07-31-2020, 09:50 PM |
|
|
Thread: 7z 11600 hash file
Post: RE: 7z 11600 hash file
Code:
--
-O -a 3 -w 3 --increment --increment-min 10 --custom-charset2 456789 hash.txt myword?2?d?d?d?d?d
--
|
|
philsmd |
hashcat
|
10 |
1,330 |
07-31-2020, 11:56 PM |