Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
it's not allowed to post hashes.
The encryption used by the PDF algorithm uses a 128 bit key.
This key is derived by a key-derivation-function and will be generated from your password as an inpu... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-12-2018, 10:51 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions).
Mask attack is in general not a good strategy to recover a password f... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-13-2018, 12:04 PM |
|
|
Thread: plz crack my password
Post: RE: plz crack my password
Hey, since you neglected to follow the rules (https://hashcat.net/forum/announcement-2.html ), I've locked your account for 1 week and closed this thread.
Now you've plenty of time to:
1. read agai... |
|
philsmd |
Old hashcat Support
|
1 |
4,341 |
02-19-2014, 09:09 PM |
|
|
Thread: Plz help with iTunes encryption
Post: RE: Plz help with iTunes encryption
dictionary-based attacks (-a 0) with rules (-r) are in general more clever compared to "brute-force" except if you know for sure that the password is 100% randomly generated |
|
philsmd |
hashcat
|
2 |
1,274 |
06-05-2019, 01:11 PM |
|
|
Thread: PMKID cracked but which AP?
Post: RE: PMKID cracked but which AP?
As you can see here https://hashcat.net/wiki/doku.php?id=example_hashes the hash format is designed in a way that it has the MAC addresses etc in it to easily recognize the network.
Which versions ... |
|
philsmd |
General Talk
|
3 |
1,678 |
07-28-2019, 11:22 AM |
|
|
Thread: PMKID cracked but which AP?
Post: RE: PMKID cracked but which AP?
try https://hashcat.net/beta/ . a lot of things changed already since last release of latest hashcat version |
|
philsmd |
General Talk
|
3 |
1,678 |
07-28-2019, 08:32 PM |
|
|
Thread: Polish letters - office
Post: RE: Polish letters - office
Maybe the confusion here is just that you are thinking that this string consists of 3 bytes, while it (probably) is at least 6 bytes long:
See here (hexdump):
Code:
--
echo -n ąąą | xxd -g 1
... |
|
philsmd |
hashcat
|
4 |
4,168 |
02-07-2017, 02:02 PM |
|
|
Thread: Polish letters - office
Post: RE: Polish letters - office
After trying your example, I came to the conclusion that you might have hit exactly one limitation of hashcat, i.e. that it doesn't perform a "perfectly correct" utf16 conversion of the password candi... |
|
philsmd |
hashcat
|
4 |
4,168 |
02-08-2017, 08:50 PM |
|
|
Thread: possible bug in ?a on 1.31
Post: RE: possible bug in ?a on 1.31
Maybe you can give the whole command line and tell us some example passwords which should be found.
Also, when you specify --increment (or short -i) you should also always specify the --increment-min... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,344 |
12-17-2014, 01:24 PM |
|
|
Thread: [Resolved] Possible bug with Office 2003 hash - no collision found
Post: RE: Possible bug with Office 2003 hash - no collis...
The problems with this forum post/thread are:
1. the general forum user is *not* allowed to post hashes (see https://hashcat.net/forum/announcement-2.html ) without explicit permission from a moderato... |
|
philsmd |
Old oclHashcat Support
|
4 |
6,235 |
08-11-2015, 08:47 PM |
|
|
Thread: Possible to use CUDA and OpenCL side-by-side?
Post: RE: Possible to use CUDA and OpenCL side-by-side?
yeah, we actually had a similar request/question like this on IRC and the "only problem" is to get the different drivers correctly installed at the same time.
It's easier on some operating systems co... |
|
philsmd |
hashcat
|
5 |
2,170 |
09-19-2019, 11:17 AM |
|
|
Thread: Possible to use CUDA and OpenCL side-by-side?
Post: RE: Possible to use CUDA and OpenCL side-by-side?
oh, I see. yeah, I meant any backend supported (OpenCL or CUDA with newest beta version), not just the "OpenCL runtime", but any runtime. That's cleary my fault in writing that incorrectly. |
|
philsmd |
hashcat
|
5 |
2,170 |
09-19-2019, 06:45 PM |
|
|
Thread: Posting a hash from malware?
Post: RE: Posting a hash from malware?
This : https://twitter.com/TalBeerySec/status/1292734995254190080 ?
vs the password "mimikatz" -m 1000 NTLM hash : https://github.com/gentilkiwi/mimikatz/blob/a2a25cc9f5cbe86cfb6baedf5d3d39aea19b5a... |
|
philsmd |
General Talk
|
2 |
477 |
08-20-2020, 11:03 PM |
|
|
Thread: Potfile entries and output file
Post: RE: Potfile entries and output file
yeah, it's exactly how it was designed.
If the hashes are already present within the pot file it means that they were also already outputted somehow, therefore there is no need to do it again and aga... |
|
philsmd |
hashcat
|
5 |
9,401 |
03-12-2018, 10:44 PM |
|
|
Thread: Potfile entries and output file
Post: RE: Potfile entries and output file
In some cases you could just extract some lines from the potfile itself (like "cat hashcat.potfile"), but this is not a good idea in general.
It's always advisable to keep all the original files |
|
philsmd |
hashcat
|
5 |
9,401 |
03-12-2018, 10:50 PM |
|
|
Thread: potfile wpa format/derivation
Post: RE: potfile wpa format/derivation
an independent checksum that is used to identify/find the correct hash, see https://github.com/hashcat/hashcat/blob/8207af471cee80012d370d551653d28516abf0c1/src/modules/module_02500.c#L756-L823
you... |
|
philsmd |
hashcat
|
6 |
414 |
09-15-2020, 07:50 AM |
|
|
Thread: potfile wpa format/derivation
Post: RE: potfile wpa format/derivation
To be honest, when I wrote that I believed that we had added a whole paragraph about the new -m 22000 format here: https://hashcat.net/forum/thread-9303.html (but we only mentioned that WPA-PBKDF2-PMK... |
|
philsmd |
hashcat
|
6 |
414 |
09-15-2020, 10:49 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
There is no more need to use a named pipe for cpu hashcat to use the PRINCE attack mode (Note: with oclHashcat you can simply pipe it, no named pipe needed at all) because version 0.49 of hashcat has ... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,889 |
01-09-2015, 02:13 PM |
|
|
Thread: precompute bcrypt hashes
Post: RE: precompute bcrypt hashes
so you are trying to build some kind of a rainbow table in 2k20 ?
the problem that you might be also completely ignoring is that I/O (disk etc) is very slow (https://en.wikipedia.org/wiki/File:Comp... |
|
philsmd |
hashcat
|
13 |
3,106 |
01-31-2020, 11:46 PM |
|
|
Thread: precompute bcrypt hashes
Post: RE: precompute bcrypt hashes
if you really think that the time (printing etc) is no problem, you could just easily add a printf () statement in the comp () kernel to print the computed digest and call it a day. no need to do any ... |
|
philsmd |
hashcat
|
13 |
3,106 |
02-01-2020, 08:19 AM |