Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
you use bitcoin2john.py to convert the wallet.dat file into a hash:
https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/bitcoin2john.py
install and use python 2.7 to ... |
|
philsmd |
General Talk
|
9 |
3,606 |
07-11-2019, 09:55 AM |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
see --help
-a 0 is dictionary attack and you need to provide a dictionary
-a 3 is mask attack (or "brute-force") and you need to provide a mask
upper = 26 chars, lower = 26 chars, digits = 10 c... |
|
philsmd |
General Talk
|
9 |
3,606 |
07-11-2019, 12:21 PM |
|
|
Thread: Newbie Wallet
Post: RE: Newbie Wallet
I don't know about that. If you say it's a "complex password system" maybe it's not random at all. I don't know about the specifics of your password system, it could be flawed and not that difficult t... |
|
philsmd |
General Talk
|
9 |
3,606 |
07-11-2019, 01:22 PM |
|
|
Thread: btcrecover extract scripts
Post: RE: btcrecover extract scripts
Only the base64 encoded hash of -m 18800 = Blockchain, My Wallet, Second Password (SHA256) for blockchain.info hashes is supported with latest (beta) version of hashcat (https://hashcat.net/beta).
... |
|
philsmd |
hashcat
|
1 |
1,240 |
07-12-2019, 11:41 AM |
|
|
Thread: Can't use hashcat with AMD Radeon R9 380
Post: RE: Can't use hashcat with AMD Radeon R9 380
what is the problem and error message you got ? details ! |
|
philsmd |
hashcat
|
9 |
3,820 |
07-12-2019, 12:36 PM |
|
|
Thread: hashcat with 3 wordlists
Post: RE: hashcat with 3 wordlists
since 2+1 = 3 you could just pre-compute 2 dicts and add the 3rd one with -a 1.
There is also combinator3 from hashcat-utils (you can pipe it but it's slower, but could be sometimes better if you tar... |
|
philsmd |
hashcat
|
1 |
1,128 |
07-13-2019, 07:39 AM |
|
|
Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...
see the output of --help
sha256(md5(pass)) is not currently supported
-a 3 needs a mask and you specify a mask directly after the hash file
e.g.
Code:
--
./hashcat64.bin -a 3 -m 4700 -D 1... |
|
philsmd |
hashcat
|
9 |
3,421 |
07-13-2019, 08:18 AM |
|
|
Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...
Code:
--
perl tools/test.pl passthrough 0 < example.dict | hashcat -m 1400 -w 3 hash.txt
--
|
|
philsmd |
hashcat
|
9 |
3,421 |
07-13-2019, 12:22 PM |
|
|
Thread: How to use gpu on bruteforcing SHA256(MD5('password'))
Post: RE: How to use gpu on bruteforcing SHA256(MD5('pas...
c'mon this should be really obvious.
The error message says that you do not have the required perl modules installed
This thread is getting a little bit weird (the strange command line options, ... |
|
philsmd |
hashcat
|
9 |
3,421 |
07-13-2019, 03:21 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
I'm pretty sure this is a known problem with how the OpenCL kernels use utf16 chars.
As far as I know, the kernel code (also for performance reasons) for utf16le encoding is very "elementary" and j... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-13-2019, 09:54 PM |
|
|
Thread: Hashcat office collision attack (9810 and 9820) doesn't work
Post: RE: Hashcat office collision attack (9810 and 9820...
sounds similar to this problem https://github.com/hashcat/hashcat/issues/2067 |
|
philsmd |
hashcat
|
2 |
1,556 |
07-16-2019, 12:05 PM |
|
|
Thread: mozilla
Post: RE: mozilla
-1 0x01
^ this is wrong syntax. where did you read about this 0x notation ? did you just guess this?
hashcat has an option called --hex-charset and you can use it like this
--hex-charset ?a?a?a... |
|
philsmd |
hashcat
|
2 |
1,306 |
07-16-2019, 02:24 PM |
|
|
Thread: How to find the password for a hidden partition of a single TrueCrypt file?
Post: RE: How to find the password for a hidden partitio...
best recommendation in such cases is always to try to generate a new very similar file/partition with TrueCrypt with known password (maybe even similar password compared to what expect) and try to cra... |
|
philsmd |
hashcat
|
6 |
2,676 |
07-16-2019, 08:31 PM |
|
|
Thread: maskprocessor - how to combine letters and numbers?
Post: RE: maskprocessor - how to combine letters and num...
-1 ?l?u?d -q 4 -r 5 ?1?1?1?1?1?1?1 |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
2,084 |
07-17-2019, 11:05 AM |
|
|
Thread: How to find the password for a hidden partition of a single TrueCrypt file?
Post: RE: How to find the password for a hidden partitio...
yeah and I also do not agree that testing is a waste of time or you can save time by just asking and take everything for granted. Verify it ! check if the claim about this sector is correct by generat... |
|
philsmd |
hashcat
|
6 |
2,676 |
07-17-2019, 01:10 PM |
|
|
Thread: CISCO ASA Enable Fix
Post: RE: CISCO ASA Enable Fix
|
philsmd |
hashcat
|
5 |
2,669 |
07-18-2019, 06:56 AM |
|
|
Thread: Hashfile input format
Post: RE: Hashfile input format
--username
please do not post hashes. you will be banned |
|
philsmd |
hashcat
|
6 |
3,092 |
07-18-2019, 06:58 AM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
yep yep yep
that's how the algorithm works (and actually most of the microsoft-invented algos),
also see this perl module to understand the algo: https://github.com/hashcat/hashcat/blob/d1f473d6... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-18-2019, 12:01 PM |
|
|
Thread: Hashfile input format
Post: RE: Hashfile input format
https://hashcat.net/faq#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword |
|
philsmd |
hashcat
|
6 |
3,092 |
07-18-2019, 05:31 PM |
|
|
Thread: CISCO ASA Enable Fix
Post: RE: CISCO ASA Enable Fix
can you run the example hash from https://hashcat.net/wiki/example_hashes correctly?
there is no ending : (colon) after the hash for this hash type (-m 2400) |
|
philsmd |
hashcat
|
5 |
2,669 |
07-19-2019, 02:58 AM |