Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: -m 11600 7z
Post: RE: -m 11600 7z
Yeah, you are right it sometimes depends on how "experimental" the beta currently is. Sometimes (actually very often) betas contain fixes for known problems/bugs and therefore at that very moment we r... |
|
philsmd |
hashcat
|
3 |
4,073 |
08-02-2017, 10:56 AM |
|
|
Thread: DES-ECB Numeric Key Search
Post: RE: DES-ECB Numeric Key Search
just use -1 charsets/DES_special/DES_numeral.charset |
|
philsmd |
hashcat
|
3 |
3,522 |
08-03-2017, 07:48 AM |
|
|
Thread: DES-ECB Numeric Key Search
Post: RE: DES-ECB Numeric Key Search
you still need to use --hex-charset also for charsets/DES_special/DES_numeral.charset since the charset is in hexadecimal format |
|
philsmd |
hashcat
|
3 |
3,522 |
08-03-2017, 09:32 AM |
|
|
Thread: mask attack with a max occurrence
Post: RE: mask attack with a max occurrence
maskprocessor (https://github.com/hashcat/maskprocessor) has 2 options:
-q, --seq-max=NUM Maximum number of multiple sequential characters
-r, --occurrence-max=NUM Maximum number of o... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
4,163 |
08-03-2017, 04:59 PM |
|
|
Thread: Users with the same hash not in output
Post: RE: Users with the same hash not in output
Can you please make sure that you use the newest version of hashcat?
Which version of hashcat do you use? |
|
philsmd |
hashcat
|
2 |
2,884 |
08-03-2017, 05:53 PM |
|
|
Thread: Cracking MySQL/MariaDB Hashes
Post: RE: Cracking MySQL/MariaDB Hashes
--increment-min and --increment-max are command line arguments that can be used in a mask attack (-a 3. Well, it is also supported in -a 6 and -a 7 actually, but always together with masks).
if you u... |
|
philsmd |
General Talk
|
2 |
5,985 |
08-04-2017, 07:39 AM |
|
|
Thread: Epic cracking!
Post: RE: Epic cracking!
@slayerdiangelo I think it has to do with your statement
Quote:
--
even a 20 char long hash can be cracked within minutes
--
Therefore, it was actually you that made this exaggerated claim and o... |
|
philsmd |
hashcat
|
17 |
13,901 |
08-04-2017, 07:46 AM |
|
|
Thread: Hi, noob query.
Post: RE: Hi, noob query.
yes:
https://hashcat.net/faq/#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword |
|
philsmd |
hashcat
|
1 |
2,307 |
08-07-2017, 07:40 AM |
|
|
Thread: Please Help
Post: RE: Please Help
... "wallet", "encrypted" ...
this could be anything. There are literally thousands of different "wallet" types.
What type of wallets are you talking about? Which software was used to generate/u... |
|
philsmd |
hashcat
|
5 |
4,722 |
08-07-2017, 07:44 AM |
|
|
Thread: Ubuntu 16.04 LTS NVIDIA Setup Guide
Post: RE: Ubuntu 16.04 LTS NVIDIA Setup Guide
We, in general, do not recommend using the package maintainers versions of the proprietary driver, since our experience showed they are either totally out-of-date or the packages are totally messed up... |
|
philsmd |
User Contributions
|
21 |
33,866 |
08-07-2017, 08:02 AM |
|
|
Thread: Please Help
Post: RE: Please Help
If you have the wallet.dat file, you could just use the normal steps:
1. use bitcoin2john.py (https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/bitcoin2john.py) to extra... |
|
philsmd |
hashcat
|
5 |
4,722 |
08-07-2017, 08:14 AM |
|
|
Thread: How to set the minimum password length?
Post: RE: How to set the minimum password length?
from https://hashcat.net/wiki/doku.php?id=rule_based_attack#rules_used_to_reject_plains :
Quote:
--
Reject rules only work either with hashcat-legacy, or when using â-jâ or â-kâ with hashc... |
|
philsmd |
hashcat
|
5 |
7,345 |
08-07-2017, 10:14 PM |
|
|
Thread: Locked out of Keepass 1.x
Post: RE: Locked out of Keepass 1.x
if you do not know how to escape special characters within your command, you should just use a hash file.
Code:
--
hashcat64.exe -m 13400 -a 3 hash_file.txt ?l?l?l?l?l?l?l
--
of course the file "h... |
|
philsmd |
hashcat
|
6 |
7,596 |
08-08-2017, 07:09 AM |
|
|
Thread: Using for Axcrypt
Post: RE: Using for Axcrypt
As already explained above, for axcrypt 1.x (every version of ax less than 2.0) you could just use axcrypt2john.py (https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/axcr... |
|
philsmd |
hashcat
|
10 |
11,238 |
08-08-2017, 11:45 AM |
|
|
Thread: Locked out of Keepass 1.x
Post: RE: Locked out of Keepass 1.x
you are not allowed to post hashes here.
Respect the forum rules or you get banned immediately.
It also can't be that difficult to use the same format of the example hash also for your hash.
You ... |
|
philsmd |
hashcat
|
6 |
7,596 |
08-08-2017, 01:55 PM |
|
|
Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Using for Axcrypt
My guess is that you should just use the correct python version and therefore:
you do not need to change the .py file at all.
With "the correct" version of python it should work without problems.
... |
|
philsmd |
hashcat
|
8 |
7,831 |
08-08-2017, 04:07 PM |
|
|
Thread: Axcrypt: axcrypt2john.py (how to use python)
Post: RE: Axcrypt: axcrypt2john.py (how to use python)
I understand that it's not your day to day job to develop or run code, but you should at least try to do some research and think about it.
This is not that difficult at all. There are literally thous... |
|
philsmd |
hashcat
|
8 |
7,831 |
08-08-2017, 09:37 PM |
|
|
Thread: Hashcat cant find my GPU
Post: RE: Hashcat cant find my GPU
Well, that should be very obvious. There are only 2 possibilities:
1. either you mess around with setting up a system that uses ancient drivers/hashcat/windows (this is not supported by the drivers m... |
|
philsmd |
hashcat
|
3 |
5,297 |
08-09-2017, 08:28 AM |
|
|
Thread: foreign words and --remove
Post: RE: foreign words and --remove
for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the... |
|
philsmd |
hashcat
|
3 |
3,868 |
08-09-2017, 08:57 AM |
|
|
Thread: Pronouncable passwords cracking
Post: RE: Pronouncable passwords cracking
Unfortunately, you can't recover a random password that is that long within a reasonable amount of time.
Just do the math:
?u?l = 26+26 = 52 characters
?d = 10 characters
=> 52 * 52 * 52 * 52 * 52... |
|
philsmd |
hashcat
|
3 |
3,417 |
08-10-2017, 03:56 PM |