Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: How to go about a password you know has 3 - 5 more or less known words?
Post: RE: How to go about a password you know has 3 - 5 ...
instead of
Code:
--
...
--
you should of course insert the path names as explained above.
Yeah, the BOM is indeed a problem, you should open the file in Notepad++ and store the file witho... |
|
philsmd |
General Talk
|
11 |
1,772 |
07-05-2020, 06:47 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
mask attack: the candidates are directly generated/used on GPU, within the GPU kernel code
attack involving dictionaries (-a 0, -a 1, -a 6, -a 7): disk I/O bottleneck AND passwords need to be "send"/... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-06-2020, 12:41 PM |
|
|
Thread: What type?
Post: RE: What type?
This is NOT allowed here. It's against the forum rules: https://hashcat.net/forum/announcement-2.html
You can't simply post some random hashes (in addition to that you are not even writing the pass... |
|
philsmd |
hashcat
|
1 |
381 |
07-07-2020, 08:27 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
if you have some specific idea, you could also develop/program your own password generator (for instance a python script or whatever) and pass the candidates to hashcat like this:
Code:
--
pytho... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:33 AM |
|
|
Thread: AesCrypt hash: How to obtain iv, enc_iv, enc_key, HMAC and encrypttion
Post: RE: How to obtain iv, enc_iv, enc_key, HMAC and en...
you might need to have a look at the Aes Crypt file format page:
https://www.aescrypt.com/aes_file_format.html
They explain how the file format is and how it changed over time
there is "AES" at... |
|
philsmd |
hashcat
|
5 |
812 |
07-07-2020, 08:09 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
no, mask attack would be MUCH, MUCH faster if you just try "random passwords". every operation involving the disk would slow it down tremendously as already explained above when we compared -a 3 with ... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:28 PM |
|
|
Thread: Only 1x DDR4 module
Post: RE: Only 1x DDR4 module
I hope you will learn to understand that you are asking the "wrong questions" . You can't really ask if something is enough without giving the whole specs of your system. What should we answer if you ... |
|
philsmd |
Hardware
|
4 |
764 |
07-08-2020, 07:15 AM |
|
|
Thread: Only 1x DDR4 module
Post: RE: Only 1x DDR4 module
what type/model of RAM and how many gigabytes (GB) of RAM ? |
|
philsmd |
Hardware
|
4 |
764 |
07-08-2020, 12:00 PM |
|
|
Thread: AesCrypt hash: How to obtain iv, enc_iv, enc_key, HMAC and encrypttion
Post: RE: How to obtain iv, enc_iv, enc_key, HMAC and en...
btw: just to be very clear, you need to run the perl script like this:
Code:
--
cd tools
perl aescrypt2hashcat.pl file.aes
--
i.e. in your cmd window, you need to enter the tools folder (I as... |
|
philsmd |
hashcat
|
5 |
812 |
07-08-2020, 12:11 PM |
|
|
Thread: AesCrypt hash: How to obtain iv, enc_iv, enc_key, HMAC and encrypttion
Post: RE: How to obtain iv, enc_iv, enc_key, HMAC and en...
next step would of course be to make sure it's a valid .aes file by comparing the file format description from https://www.aescrypt.com/aes_file_format.html with the file loaded in a hex editor (like ... |
|
philsmd |
hashcat
|
5 |
812 |
07-09-2020, 08:14 AM |
|
|
Thread: Intel i7 with 8 cores - just one core computing
Post: RE: Intel i7 with 8 cores - just one core computin...
read the --help output and see how the different supported device types can be enabled (--opencl-device-types or short -D, uppercase D)
Code:
--
-D 1,2
--
it's not always guaranteed that the C... |
|
philsmd |
hashcat
|
3 |
662 |
07-09-2020, 09:39 PM |
|
|
Thread: Problems cracking KeePass 1 db (AES)
Post: RE: Problems cracking KeePass 1 db (AES)
example hashes are here: https://hashcat.net/wiki/doku.php?id=example_hashes
you could also use
Code:
--
-m 13400 --example-hashes
--
I would guess that your hash needs to start with $keepass... |
|
philsmd |
hashcat
|
5 |
823 |
07-10-2020, 10:39 AM |
|
|
Thread: Problems cracking KeePass 1 db (AES)
Post: RE: Problems cracking KeePass 1 db (AES)
maybe the root of the problem depends on which keepass2john tool you use.
I would highly recommend to use the "official" repository: https://github.com/magnumripper/johntheripper (this is also much... |
|
philsmd |
hashcat
|
5 |
823 |
07-10-2020, 11:12 AM |
|
|
Thread: Problems cracking KeePass 1 db (AES)
Post: RE: Problems cracking KeePass 1 db (AES)
technically, you are not "cracking AES". AES is a cipher, an encryption/decryption algorithm with fixed key lengths (the keys are just a bunch of random bytes).
what you are instead doing is to cra... |
|
philsmd |
hashcat
|
5 |
823 |
07-10-2020, 12:40 PM |
|
|
Thread: Intel i7 with 8 cores - just one core computing
Post: RE: Intel i7 with 8 cores - just one core computin...
I'm not sure why you are confused about it, you actually stated above that:
1. "I installed IntelĀ® CPU Runtime for OpenCL"
2. you have CUDA installed
3. you have installed the NVIDIA driver
so ... |
|
philsmd |
hashcat
|
3 |
662 |
07-11-2020, 08:46 AM |
|
|
Thread: Last hashcat 6 format out ?!
Post: RE: Last hashcat 6 format out ?!
1. it's impossible to decrypt a hash. If something is not encrypted, you can't really decrypt it (https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/)
2. the default output format ... |
|
philsmd |
hashcat
|
1 |
423 |
07-11-2020, 12:24 PM |
|
|
Thread: Hashcat / rig troubleshooting
Post: RE: Hashcat / rig troubleshooting
I would rather try testing with only a few cards to troubleshoot it.
could be power problem and/or temperature problem. Is the system motherboard (using risers ?) etc even compatible with that powe... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
6 |
1,118 |
07-11-2020, 12:32 PM |
|
|
Thread: CL_OUT_OF_HOST_MEMORY
Post: RE: CL_OUT_OF_HOST_MEMORY
1. why do you use crunch ?
2. why do you use hashcat 5.1.0 if hashcat 6.0.0 is available (https://hashcat.net/hashcat/) ?
3. what is your command ?
4. why don't you give your full specs ? if the er... |
|
philsmd |
hashcat
|
6 |
903 |
07-11-2020, 05:00 PM |
|
|
Thread: CL_OUT_OF_HOST_MEMORY
Post: RE: CL_OUT_OF_HOST_MEMORY
- you should download hashcat directly from https://hashcat.net/hashcat/
- don't use crunch, use this instead:
Code:
--
hashcat -m 2500 -a 0 -w 3 -r my.rule -d 2 file.hccapx dict.txt
--
where... |
|
philsmd |
hashcat
|
6 |
903 |
07-11-2020, 05:22 PM |
|
|
Thread: How to crack Apple Secure Notes?
Post: RE: How to crack Apple Secure Notes?
Code:
--
hashcat -m 16200 -a 0 -w 3 -r rules/best64.rule hash_file.txt word_list.txt
--
|
|
philsmd |
hashcat
|
3 |
678 |
07-12-2020, 07:18 PM |