Search Results
|
Post |
Author
[asc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Insufficient memory
Post: RE: Insufficient memory
what's your command and what is the content of the files ?
how large are the files and what do they contain.
Read more about mask attack here: https://hashcat.net/wiki/?id=mask_attack |
|
philsmd |
hashcat
|
13 |
4,152 |
10-19-2019, 09:08 AM |
|
|
Thread: Sip Digest MD5 syntax problem
Post: RE: Sip Digest MD5 syntax problem
1. the forum rules make it very clear that you shouldn't post hashes. it's even worse that you didn't mention the password and if you know the pass of this hash (we also do not know if the hash is man... |
|
philsmd |
hashcat
|
8 |
2,729 |
10-27-2019, 10:01 PM |
|
|
Thread: Sip Digest MD5 syntax problem
Post: RE: Sip Digest MD5 syntax problem
1. generate a hash for which you know the password
2. try to compare it with the example hash from https://hashcat.net/wiki/example_hashes (it is very similar: SIP and register method and using aster... |
|
philsmd |
hashcat
|
8 |
2,729 |
10-27-2019, 10:37 PM |
|
|
Thread: Sip Digest MD5 syntax problem
Post: RE: Sip Digest MD5 syntax problem
update: the password seems to be "1234"
the hash is using $sip$***Renia*asterisk*REGISTER*sip*192.168.0.38;transport=UDP**2bf3223e****MD5*f7b5xxx |
|
philsmd |
hashcat
|
8 |
2,729 |
10-27-2019, 10:43 PM |
|
|
Thread: Sip Digest MD5 syntax problem
Post: RE: Sip Digest MD5 syntax problem
problem solved (as per PM from sakas23).
the hashes are just:
$sip$***Renia*asterisk*REGISTER*sip*192.168.0.38;transport=UDP**2bf3223e****MD5*f7b531XXX
and
$sip$***Renia*asterisk*REGISTER*s... |
|
philsmd |
hashcat
|
8 |
2,729 |
10-28-2019, 08:52 AM |
|
|
Thread: m13600 error,Self-test hash parsing error: Token encoding exception
Post: RE: m13600 error,Self-test hash parsing error: Tok...
do you think this is the same problem https://github.com/hashcat/hashcat/issues/2200 ? |
|
philsmd |
hashcat
|
4 |
1,883 |
10-30-2019, 10:24 AM |
|
|
Thread: m13600 error,Self-test hash parsing error: Token encoding exception
Post: RE: m13600 error,Self-test hash parsing error: Tok...
well, that was more like a rhetorical question ! :)
we know that it has to do with hexadecimal fields and this recent commit (which in fact isn't wrong, but only brought the problem to light becaus... |
|
philsmd |
hashcat
|
4 |
1,883 |
10-30-2019, 04:49 PM |
|
|
Thread: about the zip file size and the hash got by zip2john
Post: RE: about the zip file size and the hash got by zi...
https://github.com/hashcat/hashcat/issues/2186#issuecomment-530489997 |
|
philsmd |
hashcat
|
3 |
1,721 |
11-02-2019, 08:05 AM |
|
|
Thread: [SOLVED] 'inconsistency in registered CommandLine options' on Ubuntu 19.10
Post: RE: 'inconsistency in registered CommandLine optio...
I assume this is the OpenCL kernel compilation by the driver failing while running hashcat ?
That only means that the driver itself is not compatible with your system (linux version). maybe see if th... |
|
philsmd |
hashcat
|
5 |
3,076 |
11-02-2019, 08:09 AM |
|
|
Thread: No hashes loaded.
Post: RE: No hashes loaded.
1. respect the forum rules, do NOT post hashes
2. mention the password (123456789) if you were asked to post a masked hash by the moderator/admin
3. problem is this: https://github.com/hashcat/hashc... |
|
philsmd |
hashcat
|
4 |
2,895 |
11-03-2019, 01:21 PM |
|
|
Thread: No hashes loaded.
Post: RE: No hashes loaded.
yeah also try to not double post across the two platforms (forum vs github): https://github.com/hashcat/hashcat/issues/2211
it's so confusing, where should we answer? what should we do? we would ne... |
|
philsmd |
hashcat
|
4 |
2,895 |
11-03-2019, 03:06 PM |
|
|
Thread: Resuming attack with maskprocessor?
Post: RE: Resuming attack with maskprocessor?
the main question is: is this the correct approach ? does this even make sense with passwords not having 4 identical chars ?
... and most importantly: how much (percentage-wise) of the keyspace is ev... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
1,565 |
11-04-2019, 09:24 AM |
|
|
Thread: DES, Hex-Charset and Split/Limit??
Post: RE: DES, Hex-Charset and Split/Limit??
1. --keyspace doesn't expect any hash file. you cannot specify the hash file when computing the keyspace (remove deshash from you command line)
2. for -l (--limit) you specify the number of restore... |
|
philsmd |
hashcat
|
2 |
1,136 |
11-08-2019, 12:19 AM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
while you are on that learning trip, I think it wouldn't hurt to read this about "encrypted passwords":
https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/ |
|
philsmd |
hashcat
|
7 |
2,040 |
11-08-2019, 12:39 AM |
|
|
Thread: Low Hashrate
Post: RE: Low Hashrate
are you talking about hashes per second H/s , because Hz is something completely differnt (core clock, frequency for instance).
speed depends a lot on the attack mode and sometimes even how many ha... |
|
philsmd |
hashcat
|
10 |
3,249 |
11-10-2019, 05:21 PM |
|
|
Thread: Benchmark Variance
Post: RE: Benchmark Variance
For me it has kind of the different effect, -w 4 is even slightly faster than the benchmark with -b , because benchmark doesn't use -w 4 by default.
If you want to troubleshoot here are the relevan... |
|
philsmd |
hashcat
|
4 |
1,606 |
11-12-2019, 09:00 AM |
|
|
Thread: Benchmark Variance
Post: RE: Benchmark Variance
did you actually try to mess around with the command line options and see if you can observe any changes as suggested above?
btw: it would also make sense to read the warnings and act accordingly (... |
|
philsmd |
hashcat
|
4 |
1,606 |
11-13-2019, 01:32 AM |
|
|
Thread: Pkzip Format Error
Post: RE: Pkzip Format Error
no, that is not true.
example hashes are here: https://hashcat.net/wiki/example_hashes (or use -m 17220 --example-hashes)
the current max length is mentioned here: https://github.com/hashcat/hashc... |
|
philsmd |
hashcat
|
4 |
3,554 |
11-13-2019, 12:30 PM |
|
|
Thread: Unable to crack second half of LM hash
Post: RE: Unable to crack second half of LM hash
HASHCA is not 7 characters long (?1?1?1?1?1?1?1 cracks 7 char passwords) |
|
philsmd |
hashcat
|
2 |
1,339 |
11-13-2019, 02:00 PM |
|
|
Thread: Hashcat + LUKS + RTX 2080 (laptop)
Post: RE: Hashcat + LUKS + RTX 2080 (laptop)
maybe you use a notebook or a GPU without fan ?
luks/cryptosetup etc use a cost factor (think of iterations), it depends on how powerful the CPU on the system the disk was first encrypted (or passw... |
|
philsmd |
hashcat
|
2 |
1,389 |
11-14-2019, 10:45 PM |