Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Brute Force WPA2
Post: RE: Brute Force WPA2
no
1. --incremental is not a valid oclHashcat switch, I think you mean --increment (always double-check the switches with the --help output):
-i, --increment Enable increment mode
... |
|
philsmd |
Old oclHashcat Support
|
4 |
9,866 |
02-18-2015, 07:18 PM |
|
|
Thread: Brute Force WPA2
Post: RE: Brute Force WPA2
the mask is still missing, and this
"-a ?l?u?d"
is not valid syntax
With all this information I just did give you, you should easily understand that this is what you are looking for:
Code:
--
oclha... |
|
philsmd |
Old oclHashcat Support
|
4 |
9,866 |
02-18-2015, 08:08 PM |
|
|
Thread: Brute Forcing LM/NTLM with non ASCII Characters
Post: RE: Brute Forcing LM/NTLM with non ASCII Character...
if you want to change kernel files that are using sha512_update_global_utf16le_swap into kernel files that use sha512_update_global_swap (without utf16le), you would need to change it for every attack... |
|
philsmd |
hashcat
|
2 |
538 |
07-31-2020, 04:35 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
Well, there is no secret at all. The neo code is open source and even already linked above.
Here for instance is the verify function:
https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 10:08 AM |
|
|
Thread: Bruteforce + dictionary attack
Post: RE: Bruteforce + dictionary attack
you should be able to find the answer to your problem in the wiki https://hashcat.net/wiki/ |
|
philsmd |
Old oclHashcat Support
|
3 |
5,972 |
12-11-2014, 10:55 PM |
|
|
Thread: bruteforce mode strange behavior
Post: RE: bruteforce mode strange behavior
you need to quote the -1 argument otherwise the command line will interpret some characters as special commands. |
|
philsmd |
Old oclHashcat Support
|
1 |
5,048 |
12-27-2013, 07:58 AM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
does it work with -D 1 added to the command line:
Code:
--
hashcat -m 1000 -a 3 -O -D 1 easyntlm.txt ?l?l?l?l
--
To me this really seems like a (very dangerous) driver bug. since the self-test... |
|
philsmd |
hashcat
|
8 |
1,281 |
06-25-2020, 12:20 AM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
the -D 1 parameter does whitelist your CPU device (the Intel i7) cpu (see --help for all the command line parameters that hashcat supports and what they mean).
that means that with -D 1 you are testi... |
|
philsmd |
hashcat
|
8 |
1,281 |
06-25-2020, 12:49 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
yeah.
but even for the approach with testing first password candidates at the end, you could actually just use -s / -l until the whole keyspace was tested, i.e. split your keyspace in x chunks and te... |
|
philsmd |
hashcat
|
9 |
1,579 |
04-26-2020, 03:39 PM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
Furthermore, the left side is changed most frequently.
Is there any reason why you would need to change the order ?
You might be able to create a new hcstat2 file with hcstat2gen from hashcat-ut... |
|
philsmd |
hashcat
|
9 |
1,579 |
04-26-2020, 09:03 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
The --keyspace , --skip and --limit usage is very intuitive.
You just first determine the total "keyspace" (https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace) with ... |
|
philsmd |
hashcat
|
9 |
1,579 |
04-27-2020, 08:54 AM |
|
|
Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...
(you should use ?1 if you set -1 ) |
|
philsmd |
hashcat
|
7 |
4,636 |
11-23-2018, 11:41 AM |
|
|
Thread: Brutforce too slow? / Increment-Problems [Solved]
Post: RE: Brutforce too slow?
and you should use -u 4096 -n 32 for optimal speed (not -u 32) |
|
philsmd |
Old oclHashcat Support
|
9 |
29,020 |
01-07-2014, 11:43 PM |
|
|
Thread: BSOD with 7970
Post: RE: BSOD with 7970
Are you using oclHashcat-plus or oclHashcat-lite?
The recommended driver version for oclHashcat-plus is 13.4, but 13.8 and 13.9 seem to work also without problem here.
If you use lite and have 13.9 in... |
|
philsmd |
General Help
|
8 |
15,367 |
10-20-2013, 11:42 AM |
|
|
Thread: btcrecover extract scripts
Post: RE: btcrecover extract scripts
Only the base64 encoded hash of -m 18800 = Blockchain, My Wallet, Second Password (SHA256) for blockchain.info hashes is supported with latest (beta) version of hashcat (https://hashcat.net/beta).
... |
|
philsmd |
hashcat
|
1 |
1,240 |
07-12-2019, 11:41 AM |
|
|
Thread: Bug with complex rule ?
Post: RE: Bug with complex rule ?
Try to execute this:
Code:
--
echo -en "1\00002"|md5sum
a933d13f81649bebe035dc21f4002ff1 -
--
Basically it is: 1 || \0 || 2 where || means concatenated.
Yes, there seems to be a bug (or ... |
|
philsmd |
Very old oclHashcat-plus Support
|
8 |
16,080 |
06-01-2013, 06:15 PM |
|
|
Thread: Bug with complex rule ?
Post: RE: Bug with complex rule ?
Hey Waffle,
while I agree with most (if not all) of your suggestions here (https://hashcat.net/trac/ticket/148 ) , I also think that it is not really the solution for this problem (or perfectly relat... |
|
philsmd |
Very old oclHashcat-plus Support
|
8 |
16,080 |
06-01-2013, 08:08 PM |
|
|
Thread: Bug with complex rule ?
Post: RE: Bug with complex rule ?
Perfect, thx Waffle for these details.
It is just a pity that I/we weren't aware of these speed-truncation mechanism, unfortunatelly I think nobody documented this behaviour and why it can't be avo... |
|
philsmd |
Very old oclHashcat-plus Support
|
8 |
16,080 |
06-02-2013, 06:47 AM |
|
|
Thread: Bug with incremental and --restore?
Post: RE: Bug with incremental and --restore?
Could you please give more details about the command you are trying to run (without posting hashes of course)? |
|
philsmd |
Old oclHashcat Support
|
6 |
9,966 |
04-03-2015, 03:49 PM |