Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
Thanks for the feedback.
So if I understood you correctly everything works correctly now.
The only "problem" you did experience in very rare situation is a very high upper limit in file size (8KiB c... |
|
philsmd |
User Contributions
|
28 |
70,366 |
02-22-2017, 05:49 PM |
|
|
Thread: 7z2hashcat
Post: RE: 7z2hashcat
The original 7-zip file (*.7z) is not needed to recover the password.
But the entire output of 7z2hashcat is needed (the whole hash).
Yes, as mentioned here: https://github.com/philsmd/7z2hashcat#... |
|
philsmd |
User Contributions
|
28 |
70,366 |
11-21-2017, 12:30 PM |
|
|
Thread: ERROR: cuLaunchKernel() 999
Post: RE: ERROR: cuLaunchKernel() 999
Confirm! Same here ... Newest forceware version GTX 550 |
|
philsmd |
Very old oclHashcat-plus Support
|
27 |
48,967 |
02-19-2013, 03:58 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
you must be doing something wrong.
If I put the javascript code into my browser and run
hexMD5 ('\115' + "22222222" + '\017\226\132\264\231\243\072\025\142\343\313\006\131\010\106\311')
I get this ... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-19-2019, 12:35 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
in the capture test.pcap
if first packet javascript with salt then hash packet after javascript is VERY GOOD
if first packet hash then javascript is VERY BAD
if last packet javascript and NO ... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-22-2019, 01:29 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
https://i.postimg.cc/MpF52GFn/verygoodverybad.png |
|
philsmd |
General Talk
|
27 |
14,951 |
02-22-2019, 07:25 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
I think you are just heavily misinterpreting the tcp dump.
Just think about it a moment. The javascript code must be sent before the hexMD5 () password is sent, because the client needs to know wha... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-21-2019, 10:45 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
1. about the javascript string to hexadecimal conversion: it's just the octal code point (see https://mathiasbynens.be/notes/javascript-escapes#octal) converted to hexadecimal
something like this in ... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-21-2019, 04:38 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
the only problem is that your capture starts in the middle and ends in the middle and therefore only one complete exchange is captured.
Let's make it very clear.
The javascript + salt is the que... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-23-2019, 01:08 AM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
Q3 is a new question.
A1 was a very old answer.
we do NOT have any answer for question 3 (Q3). We have no question Q1 for answer A1.
This is because you started and stopped the capture in the mid... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-23-2019, 04:28 PM |
|
|
Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?
https://i.postimg.cc/zfwB1t82/a.png
the wireshark filter used in this image:
frame contains " = hexMD5" || frame contains "password="
answer 1: A1 (response (POST) from client with "password=",... |
|
philsmd |
General Talk
|
27 |
14,951 |
02-24-2019, 06:57 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
by the way, it doesn't seem that ethereum uses "just sha3", see https://github.com/ethereum/cpp-ethereum/blob/develop/libdevcrypto/SecretStore.cpp#L378-L418
It seems that the SHA3 () step is just p... |
|
philsmd |
hashcat
|
26 |
24,601 |
03-19-2017, 02:30 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
@dindolo1979 Attention: I would be very careful with this small set of information you provided/got here.
As far as I understood the algorithm is much more simple/straight forward and doesn't need an... |
|
philsmd |
hashcat
|
26 |
24,601 |
04-07-2017, 02:03 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, in this very specific situation it might be best to have a fast (standalone) password generator (a c file, perl script etc which only generates passwords according to your "rules").
According t... |
|
philsmd |
hashcat
|
26 |
24,601 |
04-08-2017, 09:32 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
@dindolo1979
This post is just to let you know that both ethereum algorithms are now available in the newest beta version of hashcat (beta 3.5.0+168 or newer, https://hashcat.net/beta/).
See htt... |
|
philsmd |
hashcat
|
26 |
24,601 |
06-05-2017, 03:34 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
update for ethereum modes supported by hashcat:
we recently also added -m 16300 = Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256 (https://github.com/hashcat/hashcat/pull/1476) which is currently suppor... |
|
philsmd |
hashcat
|
26 |
24,601 |
12-20-2017, 02:20 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Hmm, you should be a little bit more specific about which "perl script" your are speaking about.
I probably posted too many perl scripts on the hashcat forum already so it's not easy enough for me to... |
|
philsmd |
hashcat
|
26 |
24,601 |
12-17-2017, 11:27 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
You basically already answered your own question by explaining the algorithm details and linking to the algorithm description.
Furthermore, this question was already recently addressed within this fo... |
|
philsmd |
hashcat
|
26 |
24,601 |
02-10-2018, 07:39 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
The algorithm doesn't allow to recover the whole seed (if it was really generated in a cryptographically secure random way) by just knowing some bytes (let's say 80) of the encrypted seed (furthermore... |
|
philsmd |
hashcat
|
26 |
24,601 |
02-11-2018, 02:24 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,601 |
02-11-2018, 02:49 PM |