Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: 1password agilebits conversion - doesn't match sample?
Post: RE: 1password agilebits conversion - doesn't match...
The format for hashcat is just:
decimal_iteration_count:hexadecimal_salt:hexadecimal_digest
you could just read the encryptionKeys.js file (and base64 convert the salt and digest) or use some othe... |
|
philsmd |
hashcat
|
3 |
3,947 |
08-30-2017, 06:27 PM |
|
|
Thread: Hashcat don't parse sha256($pass.$salt) with --hex-salt
Post: RE: Hashcat don't parse sha256($pass.$salt) with -...
The newest beta version (https://hashcat.net/beta/) should fix this problem.
Thx for reporting |
|
philsmd |
hashcat
|
3 |
4,601 |
09-06-2017, 10:22 PM |
|
|
Thread: Performance difference Win 7 vs Win 10?
Post: RE: Performance difference Win 7 vs Win 10?
You should be more specific about what you are trying to run.
... or are you talking about just benchmarking with -b ?
If you do not just run "hashcat -b", but some other types of attack, e.g. w... |
|
philsmd |
hashcat
|
3 |
3,726 |
09-16-2017, 09:38 AM |
|
|
Thread: HMAC-SHA1 with binary Key
Post: RE: HMAC-SHA1 with binary Key
pro tip with hashcat 3.6+ or newer you could just use the --encoding-to command line option (if the word list is not already using the correct encoding):
Code:
--
$ cat hash.txt
30263e435f8ce1b... |
|
philsmd |
hashcat
|
3 |
4,169 |
10-16-2017, 07:33 AM |
|
|
Thread: Bitcoin Wallet Help...
Post: RE: Bitcoin Wallet Help...
You won't get any explanation/help for the GUI here (it's a third party tool and we don't give support for it here). Use the command prompt (cmd).
See https://hashcat.net/wiki/doku.php?id=example_h... |
|
philsmd |
General Talk
|
3 |
11,701 |
10-29-2017, 07:23 PM |
|
|
Thread: Bitcoin Wallet Help...
Post: RE: Bitcoin Wallet Help...
You need to run it with python (I think you should run it with python 2.7).
Yes, after installing python (and setting it up correctly in your PATH variable), you just run
Code:
--
python bitcoi... |
|
philsmd |
General Talk
|
3 |
11,701 |
10-29-2017, 08:38 PM |
|
|
Thread: How to say that the password starts with "abc"
Post: RE: How to say that the password starts with "abc"
What type of hashes do you use (there are salted hashes, where you can use abc as salt)?
What type of attack mode are you planning to use? for word list/dictionary attack you can just add a rule that... |
|
philsmd |
hashcat
|
3 |
4,527 |
11-16-2017, 12:35 PM |
|
|
Thread: Very Specific Cracking Method
Post: RE: Very Specific Cracking Method
one approach could be to create multiple rules (see https://hashcat.net/wiki/?id=rule_based_attack) each one of those rules prepends one single/different character (and does the other manipilation to ... |
|
philsmd |
hashcat
|
3 |
4,054 |
11-16-2017, 10:09 AM |
|
|
Thread: Stdin and stdout simultaneously
Post: RE: Stdin and stdout simultaneously
Yes this already works.
You must be doing something wrong, because this is working perfectly fine here.
You can troubleshoot it with just an echo command, e.g:
echo test | ./hashcat64.bin --st... |
|
philsmd |
hashcat
|
3 |
4,064 |
11-17-2017, 09:01 AM |
|
|
Thread: Very Specific Cracking Method
Post: RE: Very Specific Cracking Method
I think that would quickly result in way too many combinations/password candidates.
It of course depends on how small your wordlist is.
If the wordlist is very small you could for instance just genera... |
|
philsmd |
hashcat
|
3 |
4,054 |
11-17-2017, 01:52 PM |
|
|
Thread: Another newbie question
Post: RE: Another newbie question
It's always a good idea to create a new and similar volume (same settings/steps) and use this with a password (could also be similar to the one that you think was used) for testing hashcat.
The first... |
|
philsmd |
hashcat
|
3 |
3,665 |
11-24-2017, 03:30 PM |
|
|
Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results
This problem was already reported several months ago (see https://github.com/iphelix/pack/issues/1), but it wasn't merged yet.
I think there are some forked versions that integrate the fix, like th... |
|
philsmd |
General Talk
|
3 |
3,370 |
12-01-2017, 09:09 AM |
|
|
Thread: Another newbie question
Post: RE: Another newbie question
Yes, in theory you could use also a hex editor to extract the 512 bytes. Just make sure that the final "hash file" contains the data in binary (it does not work with hexadecimals in the hash file, it ... |
|
philsmd |
hashcat
|
3 |
3,665 |
11-25-2017, 12:23 PM |
|
|
Thread: Syntax Help
Post: RE: Syntax Help
You do not need the wallet.dat file directly for cracking (after you already extracted the information with bitcoin2john.py), you only need the file hash.txt for cracking (it already contains the "has... |
|
philsmd |
General Talk
|
3 |
3,164 |
12-02-2017, 09:01 AM |
|
|
Thread: Line-length exception?
Post: RE: Line-length exception?
you need to use -m 500 (or the long version of it: --hash-type 500):
Code:
--
hashcat64.exe -m 500 -a 0 -w 3 -o rs.txt rs.hash example.dict
--
|
|
philsmd |
General Talk
|
3 |
4,749 |
12-29-2017, 08:38 AM |
|
|
Thread: Just a little issue, hoping for some support
Post: RE: Just a little issue, hoping for some support
I'm pretty sure that this "problem" has to do with this (still open) problem:
https://github.com/hashcat/hashcat/issues/1479 (also see https://github.com/hashcat/hashcat/pull/1480)
I'm not sure wh... |
|
philsmd |
hashcat
|
3 |
2,825 |
01-02-2018, 01:09 PM |
|
|
Thread: aes128 brute-force w/mask using half sha256
Post: RE: aes128 brute-force w/mask using half sha256
Long constant strings within the mask (especially at the beginning of the mask) are always bad for the performance.
You could try to use different attack modes, like -a 6:
Code:
--
hashcat -m 1... |
|
philsmd |
hashcat
|
3 |
4,106 |
01-09-2018, 02:42 PM |
|
|
Thread: Skipping X Amount of passwords
Post: RE: Skipping X Amount of passwords
This is true.
The --keyspace, -s and -l value of hashcat are somehow different than what you might think, see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace
But... |
|
philsmd |
hashcat
|
3 |
2,782 |
01-09-2018, 05:37 PM |
|
|
Thread: How are Litecoin wallets encrypted?
Post: RE: How are Litecoin wallets encrypted?
You do not need to guess. The details of the algorithm to derive a key from the user password and use this to encrypt the data/wallet is documented all over the internet, e.g. see here: https://en.bit... |
|
philsmd |
hashcat
|
3 |
4,292 |
01-15-2018, 09:51 AM |
|
|
Thread: Hybrid Attack
Post: RE: Hybrid Attack
This is a warning. It is not an error message.
With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration. |
|
philsmd |
hashcat
|
3 |
3,011 |
02-12-2018, 10:48 PM |