Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat
Hi guys, thx @atom,
and here are the details, it is (partially) too easy to be true and not understandable why nobody else came up with this details b4 ;-):
- smd5 uses md5_crypt basically
- ssha* var... |
|
philsmd |
User Contributions
|
7 |
23,945 |
04-20-2013, 10:34 PM |
|
|
Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat
Amazing speeds! Great, thx for the port and update here |
|
philsmd |
User Contributions
|
7 |
23,945 |
04-22-2013, 01:03 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
omg, is this for real?
so you can attack both algorithms? I mean, you can attack the least secure, the faster?
My question here is, is this really Samsung specific?
This post e.g. says this is ... |
|
philsmd |
User Contributions
|
47 |
208,555 |
04-12-2013, 08:27 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Yes, we recently discussed the pattern hash here too: https://hashcat.net/forum/thread-2165.html
I know that there are so many stupid and unbelievable things out there, especially if you do some secur... |
|
philsmd |
User Contributions
|
47 |
208,555 |
04-12-2013, 10:03 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
@gat3way
Found another strange file on my phone /data/system/device_policies.xml
Code:
--
--
I think they are missing an important attribute here, namely: plain="1111"
Lol
What the... |
|
philsmd |
User Contributions
|
47 |
208,555 |
04-12-2013, 11:04 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
It is the device password! If I change my pin to 8 digits there is a very slight change:
length="8" ... numeric="8" ... nonletter="8"
It seems fun, but it really isn't. For shame!!!
Anyone can confir... |
|
philsmd |
User Contributions
|
47 |
208,555 |
04-12-2013, 12:02 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
It seems to log into a rooted device you only need to *remove* this policy file and reboot:
https://www.digitalmobile.in/community/threads/remove-pattern-lock-of-any-android-device.1893/
EDIT: But o... |
|
philsmd |
User Contributions
|
47 |
208,555 |
04-12-2013, 12:25 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail.
Of course this conversion is easy, but maybe someone di... |
|
philsmd |
User Contributions
|
47 |
208,555 |
04-12-2013, 03:33 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t... |
|
philsmd |
User Contributions
|
47 |
208,555 |
01-09-2014, 03:03 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes
For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c... |
|
philsmd |
User Contributions
|
47 |
208,555 |
03-03-2015, 02:41 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
This is very easy to crack (and to find out what algo is used), you just need to investigate a little bit and make some tests, see my tests:
Code:
--
./oclHashcat64.bin --quiet -m 110 7baad69b719... |
|
philsmd |
User Contributions
|
47 |
208,555 |
05-27-2015, 11:28 AM |
|
|
Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC
Code:
--
$ cat dict.txt
abcd
$ cat m0160.txt # masked
8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc46c:1234
$ ./hashcat-cli64.bin --quiet -m 160 m0160.txt dict.txt
8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc4... |
|
philsmd |
Old hashcat Support
|
12 |
31,848 |
07-31-2013, 06:01 PM |
|
|
Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC
Of course that is not good for attacking the hash, if you miss important information (the salt/key in general is known).
You could try to generate a list of salts (e.g. w/ maskprocessor and a suitabl... |
|
philsmd |
Old hashcat Support
|
12 |
31,848 |
07-31-2013, 06:58 PM |
|
|
Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC
Try it this way:
0. Check if the hash file is correct:
Code:
--
$ cat m0160.txt #masked
8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc46c
--
1. Generate external salts list (file: external_salts.txt):... |
|
philsmd |
Old hashcat Support
|
12 |
31,848 |
08-01-2013, 02:22 AM |
|
|
Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC
1. Eula needs to be accepted only once (if you type YES 1. time hashcat will "remember" that it was accepted)
2. the commands end at the newline character, therefore you don't need to specify the pass... |
|
philsmd |
Old hashcat Support
|
12 |
31,848 |
08-01-2013, 04:23 PM |
|
|
Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!
You need to download this file: https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/ethereum2john.py (Save as "ethereum2john.py" without quotes).
then run it with python... |
|
philsmd |
hashcat
|
9 |
7,903 |
01-03-2018, 11:48 AM |
|
|
Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!
No, the parameters N, r, p are only used with scrypt. Therefore it can't be -m 15600
Did you even do what I told you ? Did you run the python interpreter with the ethereum2john.py file and the json... |
|
philsmd |
hashcat
|
9 |
7,903 |
01-03-2018, 12:58 PM |
|
|
Thread: brute force resume
Post: RE: brute force resume
Sorry what are you talking about?
oclHashcat has support for restoring a cracking job, see:
https://hashcat.net/wiki/doku.php?id=oclhashcat#resume_support
BTW: cpu hashcat can also restore a task wi... |
|
philsmd |
Old oclHashcat Support
|
2 |
6,890 |
02-16-2015, 12:33 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
Code:
--
hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2
--
|
|
philsmd |
hashcat
|
9 |
3,465 |
11-22-2019, 08:55 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
I don't agree that "H", "K", "M" and "P" are lowercase characters.
It's probably also not the best idea to mask attack such passwords (there are some exception, e.g. if you know that those password... |
|
philsmd |
hashcat
|
9 |
3,465 |
11-29-2019, 09:34 AM |