Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: md5(md5($pass).$salt)
Post: RE: md5(md5($pass).$salt)
This is the algo used by vbulletin, see the --help output:
hashcat supports:
-m 2611 = vBulletin < v3.8.5
and
-m 2711 = vBulletin >= v3.8.5
the difference is mainly the supported salt length (s... |
|
philsmd |
hashcat
|
1 |
2,176 |
08-20-2018, 09:48 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
well, you could just use -m 3710 = md5($salt.md5($pass)) together with --hex-salt (because you said that the first MD5 is in binary not hex), an example (hashes mask with xxxx):
Code:
--
$ echo -n ... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-12-2017, 08:55 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
If you are sure that the algorithm is:
md5_hex(md5($salt) . md5_hex($pass))
... where md5 (x) is the binary/raw output and md5_hex (y) is the hexadecimal output...
then it should work.
just try it... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-12-2017, 09:17 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
Well, I guess if we agree that the algorithm is MD5(MD5_raw ($salt) . MD5_raw ($pass)) you could convert those hashes to just MD5 ($salt_new . MD5_raw ($pass)) where $salt_new is the precomputed MD5 d... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-14-2017, 07:03 AM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
a, b, c, d, 0x80 and the remaining buffers are all 0 (that should be very obvious if you think about it, it must get shorter if we do not use hex but binary instead, it will be halved i.e. 32/2 = 16).... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-15-2017, 07:23 PM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
Nope, not at all!
I just wrote:
Quote:
--
the remaining buffers are all 0
--
0 means zero and not something else (like insert the salt buffer etc, I didn't write that).
I can't help you ... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-15-2017, 07:56 PM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
Yeah, I figured that it might be very new to you to read C (or OpenCL code), but I really do not get why you use code like "w0_t[0] |= a;" when it should be just "w0_t[0] = a;" etc... (i.e. replace th... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-15-2017, 08:27 PM |
|
|
Thread: MD5: Need Advice
Post: RE: MD5: Need Advice
Yeah, it's completely wrong. Redownload a fresh copy of hashcat and do the changes correctly as I told you (I even highlighted a full set of lines you need to change so in theory you couldn't miss the... |
|
philsmd |
hashcat
|
21 |
20,788 |
05-15-2017, 08:37 PM |
|
|
Thread: Merge .16800 files into a single one
Post: RE: Merge .16800 files into a single one
Linux:
Code:
--
cat single_captures/*.16800 > all_in_one/multi.16800
--
Windows:
Code:
--
copy single_captures\*.16800 all_in_one\multi.16800
--
[hr]
alternatively, if all files are... |
|
philsmd |
hashcat
|
1 |
609 |
04-28-2020, 04:50 PM |
|
|
Thread: merge dictionary or not?
Post: RE: merge dictionary or not?
It makes sense if there are a lot of duplicates.
On linux you would just sort and unique the words with "sort -u"
Code:
--
sort -u wordlist_folder/* -o sort_and_uniqued.txt
--
|
|
philsmd |
hashcat
|
2 |
2,687 |
12-03-2017, 10:27 AM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
it will probably make some checks (in the future if really incompatible data was found, but of course the goal is to make it downwards compatible for sure) based on the version number see src/brain.c ... |
|
philsmd |
hashcat
|
8 |
2,475 |
10-12-2019, 09:30 AM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
in the current directory from which you start the brain server:
1. brain.$session.ldmp for the hashed passwords dumps (hash database)
2. brain.$session.admp for the attack positions dumps (attack da... |
|
philsmd |
hashcat
|
8 |
2,475 |
10-15-2019, 04:31 PM |
|
|
Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data
the files are only stored on the brain server (not the clients).
there is a default --brain-client-features, namely --brain-client-features 2 . that means that if you do not specify any, it default... |
|
philsmd |
hashcat
|
8 |
2,475 |
10-15-2019, 05:14 PM |
|
|
Thread: minimum password length with mask
Post: RE: minimum password length with mask
This problem was fixed very quickly with these changes: https://github.com/hashcat/hashcat/pull/1485
You can already download a fixed (beta) version of hashcat from: https://hashcat.net/beta/
Th... |
|
philsmd |
hashcat
|
6 |
8,088 |
01-03-2018, 05:57 PM |
|
|
Thread: minimum password length with mask
Post: RE: minimum password length with mask
Yes this seems to be a bug:
see
Code:
--
Skipping mask '?u?l?l' because it is smaller than the minimum password length.
[s]tatus [p]ause [r]esume [b]ypass [c]heckpoint [q]uit =>
Session......... |
|
philsmd |
hashcat
|
6 |
8,088 |
01-03-2018, 03:04 PM |
|
|
Thread: Missing hashcat-cli64.app for OSX 10.11.5
Post: RE: Missing hashcat-cli64.app for OSX 10.11.5
No, there is not really a file missing. Mac OSX users currently need to build the binary themself for reasons explained in https://github.com/hashcat/hashcat/issues/403 , https://github.com/hashcat/ha... |
|
philsmd |
hashcat
|
3 |
6,105 |
07-29-2016, 10:29 AM |
|
|
Thread: Mix of --hex-charset and non hex ?
Post: RE: Mix of --hex-charset and non hex ?
Just to make sure that other users interested in something like this do not choose a wrong approach to do these types of attacks: if you are cracking a "salted" hash, you should use the corresponding ... |
|
philsmd |
hashcat
|
7 |
5,475 |
03-18-2018, 07:46 PM |
|
|
Thread: Mix of digits, uppercase and a specific letter rule - help
Post: RE: Mix of digits, uppercase and a specific letter...
What you normally use in such a case is a mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack
Therefore, in hashcat's terminology this is not called a rule, but a mask attack (using attac... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
2,952 |
11-14-2017, 09:06 AM |
|
|
Thread: Mode 11300
Post: RE: Mode 11300
the padding is known, we exploit this (padding attack, last few bytes 16 or 8 depending on the wallet type):
https://github.com/hashcat/hashcat/blob/3dd89bc63c2614b57db58bd7b05d2d61dcc5ab75/OpenCL/... |
|
philsmd |
hashcat
|
1 |
251 |
09-24-2020, 10:17 PM |
|
|
Thread: Modifiations to hash type 18100 to support binary seeds
Post: RE: Modifiations to hash type 18100 to support bin...
yeah, that's a too large keyspace.
it's 32 ^ 16 = 1,208,925,819,614,629,174,706,176 |
|
philsmd |
hashcat
|
3 |
1,652 |
08-30-2019, 08:26 AM |