Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA1 How to get digest value in `Byte` format?
I think it makes sense to explain the problem with some exampes too.
just an example, maybe not applicable to your problem at all:
"I want to convert 0x01020304 to 0x04030201"
"I want to conver... |
|
philsmd |
hashcat
|
8 |
3,509 |
03-30-2019, 10:00 AM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...
the u32 and u8 are primitive types, you can simply cast an array of 4-byte integers to an array with 1-byte chars/bytes.
Code:
--
u8 * bytes = (u8 *) digest32;
--
or copy them directly
C... |
|
philsmd |
hashcat
|
8 |
3,509 |
03-30-2019, 11:50 AM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...
The length of a normal sha256 hash is 64 hexadecimal characters and therefore 32 raw bytes. You are trying to use 4 ints of 4 bytes = 4 * 4 = 16 bytes. That's only half the bytes of the full hash. |
|
philsmd |
hashcat
|
8 |
3,509 |
03-31-2019, 07:31 PM |
|
|
Thread: SHA256 How to get digest value in `unsigned char` format?
Post: RE: SHA256 How to get digest value in `unsigned ch...
no, it's 8 ints (all of which are 4 bytes), see https://github.com/hashcat/hashcat/blob/319bf80178e946f3b833aea3daefe3ddbfde51c2/OpenCL/inc_hash_sha256.h#L64 |
|
philsmd |
hashcat
|
8 |
3,509 |
04-01-2019, 08:35 AM |
|
|
Thread: Diskcryptor password
Post: RE: Diskcryptor password
The first step, i.e. implementing the basic DiskCryptor AES module + kernel + test was successfully done: see https://github.com/hashcat/hashcat/commit/60c255a69dd007c02c6514496fe99fce891dae22 and htt... |
|
philsmd |
hashcat
|
8 |
4,266 |
04-07-2019, 08:37 PM |
|
|
Thread: Diskcryptor password
Post: RE: Diskcryptor password
with our latest commit https://github.com/hashcat/hashcat/commit/8f62085ea49d19a2f0e0bebf1ee5ad27f4e51210 we added the support for all the 7 combinations of aes/twofish/serpent (3 pure, 3 with 2 algos... |
|
philsmd |
hashcat
|
8 |
4,266 |
04-08-2019, 07:49 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
see:
https://hashcat.net/forum/thread-6638.html
https://hashcat.net/forum/thread-2563-post-15255.html#pid15255 |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 02:43 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 08:26 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
maybe you just didn't understand the posts.
depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600.
... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 07:27 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
I guess this is just because you didn't test with the correct password candidate.
hashcat only tries the passwords that you tell it to run.
Maybe this specific hash is harder to crack and you need... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-19-2019, 11:44 AM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
yeah, it's very likely that you messed something up in converting (base64 to hex) or truncating the entropy part.
I would suggest that you also try with the example hash from https://hashcat.net/wi... |
|
philsmd |
General Talk
|
8 |
3,915 |
05-29-2019, 09:38 AM |
|
|
Thread: Ryzen 5 2400G: Difference between Linux and Windows wrt -m 1800: Factor 3.5
Post: RE: Difference between Linux and Windows wrt -m 18...
the operating system ideally makes no difference (except if you did some specific tuning with one benchmark and didn't with another). I would suggest to test at least the same versions to make a 1:1 c... |
|
philsmd |
hashcat
|
8 |
3,117 |
05-31-2019, 02:40 PM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
sorry to hear about your loss.
I think something like this explains the format pretty well: https://apple.stackexchange.com/questions/220729/what-type-of-hash-are-a-macs-password-stored-in/220863#2... |
|
philsmd |
General Talk
|
8 |
3,915 |
05-22-2019, 08:11 AM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
yeah, never ignore self-test errors. They are warning you that there is something wrong.
You could also test beta from https://hashcat.net/beta/ or release versions (even try with older ones) from ... |
|
philsmd |
General Talk
|
8 |
3,915 |
05-31-2019, 07:35 PM |
|
|
Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...
just sort and unique it
Code:
--
echo -n хер | iconv -f utf8 -t utf16le | xxd -p -c 1 | sort -un | tr -d '\n'
--
|
|
philsmd |
hashcat
|
8 |
2,730 |
06-13-2019, 10:49 PM |
|
|
Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...
this discussion is very difficult to follow. are you using 2 forum accounts or why are you BotPass answering like it was an answer to you (but actually given to boreas). How are you related if I may a... |
|
philsmd |
hashcat
|
8 |
2,730 |
06-14-2019, 09:42 PM |
|
|
Thread: Custom charsets for Cyrillic passwords in NTLM hashes
Post: RE: Custom charsets for Cyrillic passwords in NTLM...
no, it's perfectly fine to answer like you did and clarify the situation.
Thanks for the clarification !
It just wasn't very clear (maybe only to me) that this was just a general clarification/s... |
|
philsmd |
hashcat
|
8 |
2,730 |
06-15-2019, 07:42 AM |
|
|
Thread: Can I configure HC with known chars in a password?
Post: RE: Can I configure HC with known chars in a passw...
see https://hashcat.net/wiki/doku.php?id=mask_attack
hashcat -m 2500 -a 3 -2 ABC -3 ?l?u?d hash.txt D?2?3?3?3?3?3?3
-1, -2, -3, -4 are the custom charsets (--custom-charset1 ... --custom-charset... |
|
philsmd |
hashcat
|
8 |
2,780 |
08-01-2019, 09:30 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
you can just run 6213 to also crack all hashes that can be cracked with 6211 or 6212
i..e 6213 can crack all 6212 hashes too which can crack all 6211 hashes too
(the inverse e.g. 6211 cracking a... |
|
philsmd |
hashcat
|
8 |
3,445 |
08-26-2019, 02:51 PM |
|
|
Thread: Multiple hash type mode
Post: RE: Multiple hash type mode
yeah, that's true that 6233 is able to crack all 6232 hashes which is able to crack all 6231 hashes
Furthermore, 6223 is able to crack all 6222 hashes which is able to crack all 6221 hashes
but at... |
|
philsmd |
hashcat
|
8 |
3,445 |
08-26-2019, 03:07 PM |