Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password
maybe the document can be opened without problem and without password but there are other protections in place like copy/print protection etc. |
|
philsmd |
hashcat
|
10 |
8,001 |
02-08-2018, 06:49 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
You basically already answered your own question by explaining the algorithm details and linking to the algorithm description.
Furthermore, this question was already recently addressed within this fo... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-10-2018, 07:39 PM |
|
|
Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat
does the example hash work for you?
are you sure you are using the correct hash type? you need to use -m 12700 |
|
philsmd |
hashcat
|
10 |
8,863 |
02-11-2018, 09:35 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
The algorithm doesn't allow to recover the whole seed (if it was really generated in a cryptographically secure random way) by just knowing some bytes (let's say 80) of the encrypted seed (furthermore... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:24 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:49 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Now, thinking about the padding attack... I think an alternative could work without revealing the whole encseed.
The thing is that the pre-sale algorithm uses padding (as already mentioned a couple... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 04:01 PM |
|
|
Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...
This discussion would also be interesting here: https://hashcat.net/forum/thread-6405-post-39256.html#pid39256
Basically, if you can reveal at least the last 2 blocks (2*16 bytes = 32 bytes) of the... |
|
philsmd |
hashcat
|
4 |
3,766 |
02-11-2018, 07:20 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
it's not allowed to post hashes.
The encryption used by the PDF algorithm uses a 128 bit key.
This key is derived by a key-derivation-function and will be generated from your password as an inpu... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-12-2018, 10:51 PM |
|
|
Thread: Hybrid Attack
Post: RE: Hybrid Attack
This is a warning. It is not an error message.
With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration. |
|
philsmd |
hashcat
|
3 |
3,011 |
02-12-2018, 10:48 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
Well, there is no secret at all. The neo code is open source and even already linked above.
Here for instance is the verify function:
https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 10:08 AM |
|
|
Thread: [HELP] Hashcat Mask
Post: RE: [HELP] Hashcat Mask
for points 1 to 3 you could use maskprocessor. It supports the -q and -r command line arguments that filter out exactly the password candidates that do not match the policy that you described above.
... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,613 |
02-13-2018, 10:15 AM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions).
Mask attack is in general not a good strategy to recover a password f... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-13-2018, 12:04 PM |
|
|
Thread: [HELP] Hashcat Mask
Post: RE: [HELP] Hashcat Mask
That is just a hint how long WPA/WPA2 hashes could be in general (maximum allowed password length for WPA/WPA2).
For some hash types there are even 2 different kernel files (optimized vs pure). For... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,613 |
02-13-2018, 12:30 PM |
|
|
Thread: Integer overflow error
Post: RE: Integer overflow error
No, this is correct. The number of password candidates is way too huge.
Just do the math ?a has 95 characters. If we have a length of 15, we have 95^15.
The result of 95*95*95*95*....*95 (15 times) ... |
|
philsmd |
hashcat
|
5 |
3,907 |
02-14-2018, 08:37 AM |
|
|
Thread: Integer overflow error
Post: RE: Integer overflow error
I think it is the other way around.
If we look at the file docs/changes.txt it mentions that the integer overflow check was first introduced with version 3.40 of hashcat. This is why you don't see t... |
|
philsmd |
hashcat
|
5 |
3,907 |
02-14-2018, 09:20 AM |
|
|
Thread: Hashcat slows down after staring attack.
Post: RE: Hashcat slows down after staring attack.
You are trying to crack 779 networks. The benchmark only uses 1 single network to find out the maximum speed.
The huge number of networks will reduce the overall speed almost linearly.
The more ne... |
|
philsmd |
hashcat
|
7 |
6,025 |
02-14-2018, 05:49 PM |
|
|
Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3
If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the di... |
|
philsmd |
hashcat
|
6 |
5,814 |
02-15-2018, 10:30 AM |
|
|
Thread: Hashcat slows down after staring attack.
Post: RE: Hashcat slows down after staring attack.
In theory you could just split your hccapx file into 779 equally large files (the size of 1 hccapx struct is also mentioned here: https://hashcat.net/wiki/doku.php?id=hccapx , it currently is 393 byte... |
|
philsmd |
hashcat
|
7 |
6,025 |
02-15-2018, 05:51 PM |
|
|
Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat
See this issue https://github.com/hashcat/hashcat/issues/112 . I think it might be possible to just truncate the long encrypted data for -m 12700 = Blockchain, My Wallet .
You could for instance tr... |
|
philsmd |
hashcat
|
10 |
8,863 |
02-17-2018, 01:53 PM |