Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
The general idea is good @backtraffic... but ...
we really are trying hard to discourage the use of hardware without (good) cooling solutions here. so it's probably better to say: do NOT use any l... |
|
philsmd |
hashcat
|
11 |
8,625 |
01-03-2020, 11:48 AM |
|
|
Thread: crack excel password with hashcat, possible?
Post: RE: crack excel password with hashcat, possible?
Code:
--
python office2hashcat.py the_path_to_your_excel_file_here.xls
--
|
|
philsmd |
General Talk
|
6 |
23,546 |
06-30-2017, 09:17 AM |
|
|
Thread: crack rar
Post: RE: crack rar
Why do you claim that it is not working ?
It is working perfectly fine with -m 12500 = RAR3-hp
The hash even has the signature ($RAR3$*0*) that makes it very clear that no other mode than -m 12500 sh... |
|
philsmd |
hashcat
|
5 |
10,703 |
07-21-2016, 01:45 PM |
|
|
Thread: Cracked hashes during hashcat --restore not written to potfile
Post: RE: Cracked hashes during hashcat --restore not wr...
Code:
--
./hashcat
--
is different from
Code:
--
hashcat
--
if installed, the $HOME/.hashcat/ directory is used:
https://github.com/hashcat/hashcat/commit/0c65bc6ba3fd5c9068f751346d0533c... |
|
philsmd |
hashcat
|
10 |
657 |
09-19-2020, 10:56 PM |
|
|
Thread: Cracked hashes during hashcat --restore not written to potfile
Post: RE: Cracked hashes during hashcat --restore not wr...
did you copy the hashcat.restore file from another directory ?
The .restore file contains a path from which hashcat was originally launched (cwd, see https://hashcat.net/wiki/doku.php?id=restore#sc... |
|
philsmd |
hashcat
|
10 |
657 |
09-20-2020, 09:08 AM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
which --brain-client-features are you using ?
you must be more precise when you make such statements |
|
philsmd |
hashcat
|
9 |
2,508 |
10-17-2019, 06:19 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
furthermore, if you are looking for distributed cracking, you better consider using hashtopolis or similars (hashtopolis also has support for brain features as far as I know).
brain is not meant to... |
|
philsmd |
hashcat
|
9 |
2,508 |
10-17-2019, 06:25 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
no, this has nothing to do with --restore and -2 and -3 are also very different things (--custom-charset1 ... --custom-charset4).
you need to specify --brain-client-features 1 or --brain-client-fea... |
|
philsmd |
hashcat
|
9 |
2,508 |
10-17-2019, 06:28 PM |
|
|
Thread: Cracking 10 digit password with CudaHashcat
Post: RE: Cracking 10 digit password with CudaHashcat
See https://hashcat.net/wiki/doku.php?id=mask_attack
According to that wiki, you should just use a mask that includes those chars/numbers, i.e:
760?d?d?d?d?d?d?d
Full command:
cudahashcat --h... |
|
philsmd |
Old oclHashcat Support
|
7 |
21,695 |
08-20-2014, 04:22 PM |
|
|
Thread: Cracking an OS X 10.8.2 PBKDF2 Hash
Post: RE: Cracking an OS X 10.8.2 PBKDF2 Hash
The wiki clearly says what hash mode you should use: https://hashcat.net/wiki/doku.php?id=example_hashes
7100 OS X v10.8
So you need -m 7100 in your command line...
Furthermore, if you want to u... |
|
philsmd |
Old oclHashcat Support
|
5 |
14,790 |
12-12-2013, 08:28 PM |
|
|
Thread: Cracking Android Pattern Hash
Post: RE: Cracking Android Pattern Hash
Hi budabob07,
I don't think that there is something special w/ the pattern hashes... Maybe the only thing that you could argue is that they are (ALSO) special insecure...
I mean, it is correct that t... |
|
philsmd |
Very old oclHashcat-lite Support
|
5 |
21,750 |
03-24-2013, 01:31 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
The command makes no sense.
Defining any custom charset like --custom-charset1 (or short -1) without using it within the mask doesn't make any sense and is actually quite a common user mistake. :(
... |
|
philsmd |
hashcat
|
7 |
1,538 |
05-10-2020, 07:29 AM |
|
|
Thread: Cracking hash
Post: RE: Cracking hash
do not post any hashes: https://hashcat.net/forum/announcement-2.html |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
2,644 |
04-06-2020, 09:13 PM |
|
|
Thread: Cracking multiple WPA2 hashes?
Post: RE: Cracking multiple WPA2 hashes?
see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_crack_multiple_wpa_handshakes_at_once
and
https://hashcat.net/wiki/doku.php?id=hccapx |
|
philsmd |
hashcat
|
2 |
3,118 |
10-19-2018, 06:34 PM |
|
|
Thread: Cracking MySQL/MariaDB Hashes
Post: RE: Cracking MySQL/MariaDB Hashes
--increment-min and --increment-max are command line arguments that can be used in a mask attack (-a 3. Well, it is also supported in -a 6 and -a 7 actually, but always together with masks).
if you u... |
|
philsmd |
General Talk
|
2 |
5,985 |
08-04-2017, 07:39 AM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
The 5 missing bytes will still be 256 * 256 * 256 * 256 * 256 = 256 ^ 5 = 1099511627776 combinations.
That's a quite huge keyspace, even if the hashing algortihm (keccak) is quite fast.
of course ... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 04:59 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
hashcat uses ?H for 0123456789ABCDEF
therefore you could specify the mask as -a 3 --hex-charset [someting]?H[somethingElse]?H?H02
the main problem now is that the hash mode -m 5000 only supports a... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 05:46 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
the ciphertext gets decrypted into the raw seed if you have the correct password/AES key/
see my perl code https://github.com/hashcat/hashcat/issues/1279#issuecomment-351716733
Code:
--
my $h... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 09:48 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
that's good that you mention this fact/doubt about the private key vs seed, chick3nman
I assumed that the OP (uprising_bike) is sure that s/he has (part of) the seed, not the private key instead (t... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-30-2018, 07:56 AM |
|
|
Thread: Cracking pdf file with arabic password using hashcat
Post: RE: Cracking pdf file with arabic password using h...
You do not need --hex-salt. This has nothing to do with salts.
If anything you would need --hex-charset, but that is not necessariy and only needed if you define a custom charset (-1, -2, -3 or -4)... |
|
philsmd |
General Talk
|
5 |
16,216 |
11-21-2017, 05:58 PM |