Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force
it's always clever to step back a little bit and first try to understand and analyse the feasibility of this attack and the total keyspace.
My guess is that this is for WPA "hashes", so it's alread... |
|
philsmd |
hashcat
|
7 |
1,442 |
06-17-2020, 07:17 PM |
|
|
Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force
it's negligible. the more words, the less likely is that a word occurs multiple times.
As said, you could develop a fast password candidate generator that does all that fancy stuff: combining, conc... |
|
philsmd |
hashcat
|
7 |
1,442 |
06-19-2020, 05:31 PM |
|
|
Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force
it's a very special situation, which requires either a special password generator or a compromise to allow some duplicates for better speed.
The candidate generator could be as simple as this:
Co... |
|
philsmd |
hashcat
|
7 |
1,442 |
06-19-2020, 06:06 PM |
|
|
Thread: slow using rules
Post: RE: slow using rules
try with
Code:
--
-S
--
added to your command line.
Alternatively, you could generate a new dict or use stdin/pipe, but first test with -S added to your command line (only makes sense for "... |
|
philsmd |
hashcat
|
7 |
1,056 |
07-28-2020, 09:07 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
not exactly true royce, it was once implemented as a separate kernel because of some special handling:
see https://hashcat.net/forum/thread-6354.html
and https://github.com/hashcat/hashcat/commit/82... |
|
philsmd |
hashcat
|
7 |
873 |
08-10-2020, 07:07 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
you could use hashcat-legacy with your CPU from https://hashcat.net/files/hashcat-2.00.7z (deprecated, not supported anymore) update: it seems that hashcat-legacy never supported -m 190... or just i... |
|
philsmd |
hashcat
|
7 |
873 |
08-11-2020, 09:57 AM |
|
|
Thread: Looking to write a rule to replace digits
Post: RE: Looking to write a rule to replace digits
Code:
--
hashcat --stdout -a 3 -o dict.txt Password?d?d?d
hashcat --stdout -a 3 -o dict.txt My?d?d?dPassword
hashcat -m 14800 -a 0 -w 3 hash.txt dict.txt
--
|
|
philsmd |
hashcat
|
7 |
729 |
08-21-2020, 10:08 PM |
|
|
Thread: Segmentation fault [core dumped] by any execution.
Post: RE: Segmentation fault [core dumped] by any execut...
run clinfo and post the output
after that also try this: https://hashcat.net/faq/wrongdriver |
|
philsmd |
hashcat
|
7 |
594 |
08-25-2020, 06:57 PM |
|
|
Thread: Segmentation fault [core dumped] by any execution.
Post: RE: Segmentation fault [core dumped] by any execut...
what do you mean by stable ?
which version do you use ? which version is working for you ? |
|
philsmd |
hashcat
|
7 |
594 |
08-26-2020, 01:16 PM |
|
|
Thread: Looking to write a rule to replace digits
Post: RE: Looking to write a rule to replace digits
I don't think it's practical, you would need to combine rules with each and every combination (10x -r multi-rule replaces within the command, rule-chaining, to change mutliple digits at the same time)... |
|
philsmd |
hashcat
|
7 |
729 |
08-22-2020, 10:11 AM |
|
|
Thread: NetNTLMv1 format
Post: RE: NetNTLMv1 format
This example works for me:
Code:
--
u4-netntlm::kNS:338d08f8e26de93300000000000000000000000000000000:9526fb8c23a90751cdd619b6cea564742e1e4bf33006ba41:cb8086049ec4736c
--
Seems that the wiki page... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
20,096 |
05-16-2013, 03:35 PM |
|
|
Thread: Same hashes different results
Post: RE: Same hashes different results
Did some test now but was unable to reproduce this. Are you sure that the charset matches with the passwords, i.e. that all hashes *could* definitely be cracked by the mask? E.g are there no special c... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
13,507 |
05-22-2013, 03:06 PM |
|
|
Thread: Same hashes different results
Post: RE: Same hashes different results
I did now try to run the exactly same cmds on my machine (32bit, cuda - gtx 580, win) and I always get following output (tested w/ newest beta and w/ release version 0.14):
Code:
--
Recovered......:... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
13,507 |
05-25-2013, 10:28 AM |
|
|
Thread: How to map a password policy onto your Mask?
Post: RE: How to map a password policy onto your Mask?
Hey Rob,
the best thing you should do is to have a look into the hashcat wiki https://hashcat.net/wiki/ and for your particular problem, see here: https://hashcat.net/wiki/doku.php?id=mask_attack
Your... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
6 |
16,455 |
05-29-2013, 10:44 AM |
|
|
Thread: sha-1 with salt cracking issue
Post: RE: sha-1 with salt cracking issue
johnreich Wrote: (07-01-2013, 07:37 PM)
--
...am i doing something wrong?
--
Yes, you post hashes here, while the forum rules clearly say you should NEVER post hashes.
https://hashcat.net/forum/a... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
13,967 |
07-01-2013, 07:48 PM |
|
|
Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus
I would like to trac(k) this problem here: https://hashcat.net/trac/ticket/174 |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
10,960 |
07-03-2013, 06:34 PM |
|
|
Thread: sha-1 with salt cracking issue
Post: RE: sha-1 with salt cracking issue
Again, no reason to post hashes unmasked (but I see you now modified your 1st post, good).
So are you able to generate the *same* hash w/ e.g. sha1sum or an online hash generator?
If you are only abl... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
13,967 |
07-01-2013, 08:38 PM |
|
|
Thread: Salted SHA-1 found by Lite but not by Plus
Post: RE: Salted SHA-1 found by Lite but not by Plus
I don't know if this is a problem w/ lite, but it seems to output the digest just in byte-swapped format, see here to understand that (first plus - correct -, then lite):
4205d56d
6dd50542
what h... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
10,960 |
07-02-2013, 09:17 AM |
|
|
Thread: sha-1 with salt cracking issue
Post: RE: sha-1 with salt cracking issue
The algorithm could use and do literally everything.
I mean, it could iterate a random number of times (and store the number in salt), it could split the salt and prefix/suffix it, append it, suffix ... |
|
philsmd |
Very old oclHashcat-plus Support
|
6 |
13,967 |
07-02-2013, 09:29 AM |
|
|
Thread: Make Wordlist
Post: RE: Make Wordlist
I don't think that with 16 chars it is very clever and fast to generate a wordlist.
Also, depending on the hash mode and your hardware setup, 16 chars may take quite long to bruteforce too
Anyway, th... |
|
philsmd |
General Talk
|
6 |
20,005 |
08-22-2013, 01:04 AM |