Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat

Hi guys, thx @atom, and here are the details, it is (partially) too easy to be true and not understandable why nobody else came up with this details b4 ;-): - smd5 uses md5_crypt basically - ssha* var...
philsmd User Contributions 7 23,945 04-20-2013, 10:34 PM
    Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat

Amazing speeds! Great, thx for the port and update here
philsmd User Contributions 7 23,945 04-22-2013, 01:03 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

omg, is this for real? so you can attack both algorithms? I mean, you can attack the least secure, the faster? My question here is, is this really Samsung specific? This post e.g. says this is ...
philsmd User Contributions 47 208,555 04-12-2013, 08:27 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

Yes, we recently discussed the pattern hash here too: https://hashcat.net/forum/thread-2165.html I know that there are so many stupid and unbelievable things out there, especially if you do some secur...
philsmd User Contributions 47 208,555 04-12-2013, 10:03 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

@gat3way Found another strange file on my phone /data/system/device_policies.xml Code: -- -- I think they are missing an important attribute here, namely: plain="1111" Lol What the...
philsmd User Contributions 47 208,555 04-12-2013, 11:04 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

It is the device password! If I change my pin to 8 digits there is a very slight change: length="8" ... numeric="8" ... nonletter="8" It seems fun, but it really isn't. For shame!!! Anyone can confir...
philsmd User Contributions 47 208,555 04-12-2013, 12:02 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

It seems to log into a rooted device you only need to *remove* this policy file and reboot: https://www.digitalmobile.in/community/threads/remove-pattern-lock-of-any-android-device.1893/ EDIT: But o...
philsmd User Contributions 47 208,555 04-12-2013, 12:25 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail. Of course this conversion is easy, but maybe someone di...
philsmd User Contributions 47 208,555 04-12-2013, 03:33 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t...
philsmd User Contributions 47 208,555 01-09-2014, 03:03 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c...
philsmd User Contributions 47 208,555 03-03-2015, 02:41 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

This is very easy to crack (and to find out what algo is used), you just need to investigate a little bit and make some tests, see my tests: Code: -- ./oclHashcat64.bin --quiet -m 110 7baad69b719...
philsmd User Contributions 47 208,555 05-27-2015, 11:28 AM
    Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC

Code: -- $ cat dict.txt abcd $ cat m0160.txt # masked 8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc46c:1234 $ ./hashcat-cli64.bin --quiet -m 160 m0160.txt dict.txt 8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc4...
philsmd Old hashcat Support 12 31,848 07-31-2013, 06:01 PM
    Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC

Of course that is not good for attacking the hash, if you miss important information (the salt/key in general is known). You could try to generate a list of salts (e.g. w/ maskprocessor and a suitabl...
philsmd Old hashcat Support 12 31,848 07-31-2013, 06:58 PM
    Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC

Try it this way: 0. Check if the hash file is correct: Code: -- $ cat m0160.txt #masked 8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc46c -- 1. Generate external salts list (file: external_salts.txt):...
philsmd Old hashcat Support 12 31,848 08-01-2013, 02:22 AM
    Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC

1. Eula needs to be accepted only once (if you type YES 1. time hashcat will "remember" that it was accepted) 2. the commands end at the newline character, therefore you don't need to specify the pass...
philsmd Old hashcat Support 12 31,848 08-01-2013, 04:23 PM
    Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!

You need to download this file: https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/ethereum2john.py (Save as "ethereum2john.py" without quotes). then run it with python...
philsmd hashcat 9 7,903 01-03-2018, 11:48 AM
    Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!

No, the parameters N, r, p are only used with scrypt. Therefore it can't be -m 15600 Did you even do what I told you ? Did you run the python interpreter with the ethereum2john.py file and the json...
philsmd hashcat 9 7,903 01-03-2018, 12:58 PM
    Thread: brute force resume
Post: RE: brute force resume

Sorry what are you talking about? oclHashcat has support for restoring a cracking job, see: https://hashcat.net/wiki/doku.php?id=oclhashcat#resume_support BTW: cpu hashcat can also restore a task wi...
philsmd Old oclHashcat Support 2 6,890 02-16-2015, 12:33 PM
    Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)

Code: -- hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2 --
philsmd hashcat 9 3,465 11-22-2019, 08:55 PM
    Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)

I don't agree that "H", "K", "M" and "P" are lowercase characters. It's probably also not the best idea to mask attack such passwords (there are some exception, e.g. if you know that those password...
philsmd hashcat 9 3,465 11-29-2019, 09:34 AM