Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
maybe you should contact your email service provider and/or the blockchain support !?
There is also no such thing as decoded blockchain hash or decrypted hash. hashes can sometimes be cracked (but ... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 08:42 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
I've modified your latest post, because you shouldn't post private/sensitive info here (the forum rules say do not post hashes in public).
If the the wallet has double_encryption enabled you probab... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 10:10 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
as explained here: https://hashcat.net/forum/thread-8288-post-44420.html#pid44420
the only way to obtain the second hash for -m 18800 (you of course need to crack the second hash for the second passw... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 10:43 PM |
|
|
Thread: Brain is much slower than expected
Post: RE: Brain is much slower than expected
I would suggest starting with reading this: https://hashcat.net/forum/thread-7903.html (most importantly the section "Major Feature: The hashcat brain").
of course the brain is most efficient and I... |
|
philsmd |
hashcat
|
5 |
2,964 |
04-16-2019, 10:55 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
crack the hashes you obtain with with extract-blockchain-second-hash.py -m 18800 = Blockchain, My Wallet, Second Password (SHA256)
if you have removed the double encryption (BOTH encryptions), you ... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 11:12 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
so as far as I understood, the question (also in regards to your PM) was how to obtain the intermediate results between the two decryption step. Well, it's just using PBKDF2-HMAC-SHA1 (32 byte output)... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-17-2019, 08:46 AM |
|
|
Thread: Second GPU is not recognized
Post: RE: Second GPU is not recognized
your clinfo basically proofs that it is not hashcat fault because also clinfo only sees a single RX 580 (there is only one GPU in your list).
I would suggest reinstalling the driver and/or messing ... |
|
philsmd |
Hardware
|
2 |
2,021 |
04-18-2019, 12:40 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
see:
https://hashcat.net/forum/thread-6638.html
https://hashcat.net/forum/thread-2563-post-15255.html#pid15255 |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 02:43 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
maybe you just didn't understand the posts.
depending on the output you get from your capture tool/dump (i.e. if it is NetNTLMv1 / NetNTLMv1+ESS or NetNTLMv2), you need to use -m 5500 or -m 5600.
... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 07:27 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
the domain is actually not used in computing the response and therefore can be skipped/ignored/anything, but the client challenge must be specified (e.g. 338d08f8e26de933000000000000000000000000000000... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-18-2019, 08:26 PM |
|
|
Thread: Module 5500 - different results for same hash (with or without client challenge part)
Post: RE: Module 5500 - different results for same hash ...
I guess this is just because you didn't test with the correct password candidate.
hashcat only tries the passwords that you tell it to run.
Maybe this specific hash is harder to crack and you need... |
|
philsmd |
hashcat
|
8 |
3,607 |
04-19-2019, 11:44 AM |
|
|
Thread: Brain is much slower than expected
Post: RE: Brain is much slower than expected
I guess that depends on how large the percentage of rejected passwords is and how fast the algorithm is.
brain doesn't make the H/s speed of your GPUs faster, that only depends on the OpenCL device... |
|
philsmd |
hashcat
|
5 |
2,964 |
04-19-2019, 01:35 PM |
|
|
Thread: Problem with token length exceptions
Post: RE: Problem with token length exceptions
make sure that the args.txt file only contains the arguments starting with -a 3 (not the binary "hashcat32.exe" too)
also make sure that the file "hashes.txt" only contains valid MD5 hashes
you ... |
|
philsmd |
hashcat
|
2 |
1,718 |
04-25-2019, 07:48 PM |
|
|
Thread: iTunes backup help...
Post: RE: iTunes backup help...
best advice is to remember as much as possible from the password that was (probably) used and build some small (or up to medium) sized dictionary which follows those policies/patterns.
Of course it... |
|
philsmd |
hashcat
|
10 |
4,436 |
04-30-2019, 10:40 AM |
|
|
Thread: iTunes backup help...
Post: RE: iTunes backup help...
I think brute-force is a very bad strategy here.
I would stick with dictionary attacks (-a 0) and only if you are sure about a very specific pattern or did already try all possibilities (likely pas... |
|
philsmd |
hashcat
|
10 |
4,436 |
04-30-2019, 07:05 PM |
|
|
Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt
you can use the --outfile (short -o) option and redirect all errors to /dev/null
Code:
--
hashcat -m 0 --show -o outfile.txt hashes.txt 2> /dev/null > /dev/null
--
on windows it's very simil... |
|
philsmd |
hashcat
|
5 |
2,706 |
05-02-2019, 02:00 PM |
|
|
Thread: pkzip2
Post: RE: pkzip2
see https://github.com/hashcat/hashcat/pull/1962 , it's work in progress. I have no clue what you are trying to say with that sentence regarding AES, the main problem was that we have to do huffman c... |
|
philsmd |
hashcat
|
2 |
2,977 |
05-03-2019, 07:39 AM |
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).
as we told you already hundreds of times (at least that ... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-05-2019, 05:03 PM |
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
yeah, -a 0 (dictionary attack) makes most sense with -m 2501 and -m 16801
the general approach is to use wlangenpmk (or wlangenpmkocl for OpenCL support) from https://github.com/ZerBea/hcxkeys
... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-06-2019, 09:03 AM |
|
|
Thread: Some remarks and maybe idea for improvement
Post: RE: Some remarks and maybe idea for improvement
hashcat uses markov by default (it's not random), it's trained with rockyou.txt (update see below).
you can use --markov-hcstat2 and hcstat2gen (see https://github.com/hashcat/hashcat-utils/blob/ma... |
|
philsmd |
hashcat
|
1 |
1,919 |
05-09-2019, 11:48 AM |