Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: foreign words and --remove
Post: RE: foreign words and --remove
for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the... |
|
philsmd |
hashcat
|
3 |
3,868 |
08-09-2017, 08:57 AM |
|
|
Thread: format username:password?
Post: RE: format username:password?
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
btw: https://www.techsolvency.com/p... |
|
philsmd |
hashcat
|
3 |
151 |
Yesterday, 12:31 PM |
|
|
Thread: format username:password?
Post: RE: format username:password?
just make sure that the input is correct and also remember that the way to do it is 2-fold (2 steps are needed ), i.e. first crack such that the cracked hashes with password end up in the .potfile, on... |
|
philsmd |
hashcat
|
3 |
151 |
10 hours ago |
|
|
Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash
it's hash mode -m 7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems
also see https://hashcat.net/wiki/example_hashes for example hashes (search for OS X v10.8 / v10.9) |
|
philsmd |
hashcat
|
5 |
8,048 |
01-24-2017, 09:30 PM |
|
|
Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash
You can "truncate"/cut the hash itself @ the same length used by the example hash :) |
|
philsmd |
hashcat
|
5 |
8,048 |
01-24-2017, 09:56 PM |
|
|
Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?
Status...........: Cracked
it's very obvious if it's cracked or not |
|
philsmd |
hashcat
|
9 |
3,254 |
09-05-2019, 12:51 PM |
|
|
Thread: full parallel power of device
Post: RE: full parallel power of device
-a 3 means mask attack (https://hashcat.net/wiki/doku.php?id=mask_attack)
so what you basically did is run a dictionary (the dictionary attack would be -a 0) with -a 3, i.e. run each word in the ma... |
|
philsmd |
hashcat
|
6 |
1,844 |
12-23-2019, 08:54 AM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack
Code:
--
hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u
--
|
|
philsmd |
General Talk
|
12 |
8,565 |
07-25-2018, 07:27 PM |
|
|
Thread: Generator mscash2?
Post: RE: Generator mscash2?
1. you are not allowed to post hashes here (see https://hashcat.net/forum/announcement-2.html ), why can't you just say what the problem is (or at least mask the hash) ?
2. The error probably says line... |
|
philsmd |
General Help
|
3 |
11,612 |
08-16-2013, 08:20 PM |
|
|
Thread: Generator of fortune
Post: RE: Generator of fortune
what's going on here? one (actually 2) completely new forum accounts without any previous posts suddently talking about a tool with very strange description and furthermore a tool that was already con... |
|
philsmd |
User Contributions
|
8 |
2,022 |
06-15-2020, 11:06 AM |
|
|
Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt
N3HL Wrote: (01-30-2015, 02:05 PM)
--
im completely new to hashcat, and I noticed it's missing some docs
--
Not at all, the docs are:
1. https://hashcat.net/wiki/
2. --help output of oclHashcat or c... |
|
philsmd |
Old hashcat Support
|
9 |
47,256 |
01-30-2015, 04:43 PM |
|
|
Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt
you could use the --username switch of hashcat/oclHashcat.
input format (you must use the --username switch to crack the hashes):
username:hash:salt
second step (after cracking); you can output it w... |
|
philsmd |
Old hashcat Support
|
9 |
47,256 |
01-30-2015, 05:45 PM |
|
|
Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt
--show is always used to show the cracks for a specific oclHashcat session after the actual cracking process is done.
So it would look like this:
oclHashcat64.exe -m 2811 --username hashes.txt dict.... |
|
philsmd |
Old hashcat Support
|
9 |
47,256 |
01-30-2015, 06:24 PM |
|
|
Thread: getcernelarginfo procedure entry point not found in library
Post: RE: getcernelarginfo procedure entry point not fou...
it's probably kernel with "k" (clGetKernelArgInfo () )
for the problem itself, it's probably a setup/driver issue. Your explanation is also very misleading and missing some crucial facts. I think y... |
|
philsmd |
hashcat
|
1 |
746 |
12-08-2019, 01:36 PM |
|
|
Thread: Getting 0H/S and 0 progress
Post: RE: Getting 0H/S and 0 progress
Code:
--
hashcat -m 7100 -a 0 hash.txt dict.txt
--
|
|
philsmd |
hashcat
|
3 |
6,120 |
07-25-2018, 07:25 PM |
|
|
Thread: Getting a Hash Via DD From a VeraCrypt File
Post: RE: Getting a Hash Via DD From a VeraCrypt File
... if you are using crunch together with hashcat you are probably doing something wrong (well, this might not always be the case, but most of the time for new users!)
hashcat has all the attack mode... |
|
philsmd |
hashcat
|
4 |
5,596 |
03-30-2017, 12:21 PM |
|
|
Thread: Getting a weird hash from PDF?
Post: RE: Getting a weird hash from PDF?
As far as I know the current up-to-date script to extract the info from .pdf files is pdf2john.pl (a perl file not a python file):
https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleedin... |
|
philsmd |
hashcat
|
2 |
3,265 |
11-10-2017, 10:17 PM |
|
|
Thread: good wordlist
Post: RE: good wordlist
hmm, interesting.
but the site looks quite bad/fishy. "tested on neighbours Wi-Fi", bitcoin address, "must-have", big password list to download (let me explain below)....
and back to the topic,... |
|
philsmd |
User Contributions
|
2 |
4,253 |
12-19-2018, 11:02 AM |
|
|
Thread: GPU comparison (passwords per second)
Post: RE: GPU comparison (passwords per second)
For example this: https://www.golubev.com/gpuest.htm |
|
philsmd |
Hardware
|
4 |
12,882 |
05-27-2014, 07:25 PM |
|
|
Thread: GPU Crack Speed Half of Expected
Post: RE: GPU Crack Speed Half of Expected
the commands that you use are very weird/wrong:
1. the -w that you use twice in your -a 0 (dictionary attack) is wrong. why two times -w ? one time -w without the actual workload profile
2. in t... |
|
philsmd |
hashcat
|
3 |
786 |
06-30-2020, 07:43 AM |