Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Cracking pdf file with arabic password using hashcat
Post: RE: Cracking pdf file with arabic password using h...
this of course depends on what the tool that you use to encrypt the pdf (acrobat reader etc) does with the input. It could use utf-8 by default. it could use utf16-le etc...
The linux echo tool wont ... |
|
philsmd |
General Talk
|
5 |
16,216 |
11-21-2017, 07:27 PM |
|
|
Thread: cracking salted linux shadow hash: Unable to load due to Line-length
Post: RE: cracking salted linux shadow hash: Unable to l...
of course it is salted (the part after "$6$" and before the "$hash" part, i.e. "52450745" for this very specific example is the salt) and the whole sha512crypt hash can be generated like this in pytho... |
|
philsmd |
hashcat
|
5 |
9,574 |
08-11-2016, 09:16 AM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
not exactly true royce, it was once implemented as a separate kernel because of some special handling:
see https://hashcat.net/forum/thread-6354.html
and https://github.com/hashcat/hashcat/commit/82... |
|
philsmd |
hashcat
|
7 |
873 |
08-10-2020, 07:07 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
you could use hashcat-legacy with your CPU from https://hashcat.net/files/hashcat-2.00.7z (deprecated, not supported anymore) update: it seems that hashcat-legacy never supported -m 190... or just i... |
|
philsmd |
hashcat
|
7 |
873 |
08-11-2020, 09:57 AM |
|
|
Thread: Cracking speed
Post: RE: Cracking speed
1. are you sure that the hash file is in the correct format (.hccap format), see https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 , https://hashcat.net/cap2hccap/ ...
2. screenshot says 0/0 hash... |
|
philsmd |
Old hashcat Support
|
3 |
10,531 |
07-06-2014, 07:09 PM |
|
|
Thread: Cracking TACACS+ with hashcat
Post: RE: Cracking TACACS+ with hashcat
This is very interesting information and a nice find about how to best filter out "wrong results".
Good job.
Thanks for the research.
I must admit that I didn't have much to do with tacacs+ so ... |
|
philsmd |
User Contributions
|
1 |
6,737 |
11-30-2017, 04:06 PM |
|
|
Thread: cracking way too fast?
Post: RE: cracking way too fast?
If you use the release version from https://hashcat.net/ you just need to know that this is a known issue and was already fixed: https://github.com/hashcat/hashcat/issues/1178
You can use https://has... |
|
philsmd |
hashcat
|
2 |
3,599 |
03-26-2017, 06:32 PM |
|
|
Thread: cracking Wifi with android phone
Post: RE: cracking Wifi with android phone
(I will only answer the hashcat related part of the question, because this is the hashcat forum.... how you obtain networks traffic captures is another question not related to hashcat at all,,. hint: ... |
|
philsmd |
hashcat
|
2 |
2,328 |
12-20-2018, 09:37 AM |
|
|
Thread: Crackpos incorrect
Post: RE: Crackpos incorrect
as you might already know, if you use any amplifier (like rules) the total number of password candidates will increase. This implies also that the "Progress" number in the status screen will get large... |
|
philsmd |
hashcat
|
12 |
5,625 |
02-15-2019, 09:39 AM |
|
|
Thread: Crash on every exit
Post: RE: Crash on every exit
Hey Kuci,
did you try also w/ catalyst 13.1 (https://support.amd.com/us/gpudownload/windows/previous/13/Pages/radeon_linux.aspx?os=Linux%20x86&rev=13.1 ) as suggested in GPU Driver and SDK Requirement... |
|
philsmd |
Very old oclHashcat-lite Support
|
2 |
7,695 |
06-01-2013, 02:36 PM |
|
|
Thread: crc32 hash format, No hashes loaded, line length exception?
Post: RE: crc32 hash format, No hashes loaded, line leng...
This is not the correct hash format that you use.
The correct hash format can always be determined by looking at the example hashes here https://hashcat.net/wiki/doku.php?id=example_hashes (or using ... |
|
philsmd |
hashcat
|
2 |
2,586 |
12-05-2017, 04:29 PM |
|
|
Thread: Create a single rule file with maskprocessor
Post: RE: Create a single rule file with maskprocessor
Congratz, you actually found out the "hard way" what the differences between rule and mask attack is (the easy way would be to just read the wiki pages, in this specific case especially these 2 pages:... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
6,701 |
07-24-2016, 11:26 AM |
|
|
Thread: Create PKZIP Master Key
Post: RE: Create PKZIP Master Key
do not post hashes in this forum, see https://hashcat.net/forum/announcement-2.html
The example hashes are here: https://hashcat.net/wiki/example_hashes (hint: they do not have any file names etc, ... |
|
philsmd |
hashcat
|
4 |
1,849 |
01-14-2020, 03:36 PM |
|
|
Thread: Create PKZIP Master Key
Post: RE: Create PKZIP Master Key
you do not use the output of zip2john at all for -m 20500 or -m 20510.
you just use the key that bkcrack will give you if you have succeeded with a known plaintext attack |
|
philsmd |
hashcat
|
4 |
1,849 |
01-14-2020, 03:51 PM |
|
|
Thread: creating a mask
Post: RE: creating a mask
maskprocessor can be used for this situation (the -q parameter can be used) and the output can be piped into hashcat:
Code:
--
mp64 -q 2 -1 abc ?1?1?1 | hashcat -a 0 -m 0 -w 4 hash.txt
--
|
|
philsmd |
General Talk
|
4 |
4,602 |
06-28-2017, 03:37 PM |
|
|
Thread: Creating new or custom charset for hashcat
Post: RE: Creating new or custom charset for hashcat
@S3TH: You really need to understand hashcat's definitions of:
1. mask attack
2. built-in and custom charsets
3. rules (which in hashcat's term is a completely different attack), please don't ever mix... |
|
philsmd |
Old hashcat Support
|
3 |
28,490 |
03-19-2016, 11:32 AM |
|
|
Thread: Creating rule file
Post: RE: Creating rule file
just use this:
Code:
--
maskprocessor 'T0$1$9$?d$?d' > toggle_first_and_append_digits.rule
--
btw: if you look here: https://hashcat.net/wiki/rule_based_attack the "TN" rule stands for toggle not ... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
9,180 |
08-18-2016, 04:17 PM |
|
|
Thread: Creating rule file
Post: RE: Creating rule file
That's a very known "limitation". The rejection test will occur as soon as possible and in most of the cases makes perfect sense since otherwise too short plains will be transfered to the GPUs. Since ... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
9,180 |
08-20-2016, 02:27 PM |
|
|
Thread: Creating sha512(sha512($pass).$salt) kernel
Post: RE: Creating sha512(sha512($pass).$salt) kernel
shouldn't the first hash be 128 hex characters (instead of 64) ? Just test with "echo -n hashcat | sha512sum", it is exactly 128 hex chars long.
you would also need to test if the salt needs to be ... |
|
philsmd |
hashcat
|
3 |
1,391 |
12-25-2019, 08:01 PM |
|
|
Thread: Creating sha512(sha512($pass).$salt) kernel
Post: RE: Creating sha512(sha512($pass).$salt) kernel
in OpenCL/m20710_a0-pure.cl I don't see that ctx.w0[0] is modified directly etc...
why don't you just start with 2 very easy blocks of init/update(s)/final for the first SHA512 hash and init/update... |
|
philsmd |
hashcat
|
3 |
1,391 |
12-25-2019, 09:41 PM |