Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: RC4 attack for 40bit Word 97-2003
Post: RE: RC4 attack for 40bit Word 97-2003
?b means that hashcat should try all possible values a byte can have, i.e.
from 0x00 to 0xff, this means that each byte has 256 possibilities
256^5 = 256*256*256*256*256 = 1099511627776 combinations
... |
|
philsmd |
hashcat
|
6 |
6,545 |
11-16-2017, 12:05 PM |
|
|
Thread: RC4 attack for 40bit Word 97-2003
Post: RE: RC4 attack for 40bit Word 97-2003
My guess is that there might be a lot of tools around or you just slightly modify a popular tool like libreoffice. We only need to replace the actual key that was generated from a "fake" password with... |
|
philsmd |
hashcat
|
6 |
6,545 |
11-16-2017, 12:23 PM |
|
|
Thread: real noob looking for help!
Post: RE: real noob looking for help!
The best thing you could do here is to code a new hashcat module and kernel (OpenCL .cl file with update/final function calls, see https://github.com/hashcat/hashcat/blob/23917455efad1deba8c12516e1922... |
|
philsmd |
hashcat
|
1 |
1,407 |
03-01-2019, 02:27 PM |
|
|
Thread: Recover blockchain.info password from .joson file ?
Post: RE: Recover blockchain.info password from .joson f...
1. The hashes must be formatted according to these guide/examples: https://hashcat.net/wiki/example_hashes (search for 12700). Therefore there should not be any file names within the "hash" etc (yes, ... |
|
philsmd |
hashcat
|
11 |
21,159 |
01-14-2018, 09:29 AM |
|
|
Thread: Recover blockchain.info password from .joson file ?
Post: RE: Recover blockchain.info password from .joson f...
You are trying to crack with your CPU ? does it support OpenCL ?
I remember reading somewhere that Intel Core 2 are not even supported by the OpenCL drivers of intel.
Even if they were supported, it... |
|
philsmd |
hashcat
|
11 |
21,159 |
01-14-2018, 09:55 AM |
|
|
Thread: Recover blockchain.info password from .joson file ?
Post: RE: Recover blockchain.info password from .joson f...
It doesn't make sense to get hashcat-legacy working. hashcat-legacy doesn't even support blockchain hashes. Only new versions of hashcat (OpenCL version, not the legacy version) support blockchain has... |
|
philsmd |
hashcat
|
11 |
21,159 |
01-14-2018, 10:11 AM |
|
|
Thread: Recover NTLM with charset: !@$etaoinshrdlu134579
Post: RE: Recover NTLM with charset: !@$etaoinshrdlu1345...
Hey, since you neglected to follow the rules (https://hashcat.net/forum/announcement-2.html ), I've locked your account for 1 week.
Now you've plenty of time to:
1. read again the forum rules
2. r... |
|
philsmd |
Old oclHashcat Support
|
9 |
17,221 |
02-23-2014, 01:12 PM |
|
|
Thread: Recover password file .7z partially known
Post: RE: Recover password file .7z partially known
That's a 3 MB file compressed (uncompressed maybe even much larger if not totally random data).
Are there several files within the .7z file ?
You could also try to increase the limit that hashcat ac... |
|
philsmd |
hashcat
|
4 |
4,899 |
01-05-2018, 10:35 AM |
|
|
Thread: Recover passwords in output user:plain
Post: RE: Recover passwords in output user:plain
What you need are following steps (example with mode 0 (md5) of example0.hash):
Code:
--
$ cat hashtest.hash # some random *X MASKED* hashes from example0.hash
philsmd:42cceb8a0dXXX82b8fb6831f3... |
|
philsmd |
Old hashcat Support
|
9 |
32,229 |
04-11-2013, 04:17 PM |
|
|
Thread: Recover xDsl Router TG788vn v2 Password
Post: RE: Recover xDsl Router TG788vn v2 Password
this hashing algorithm looks very similar to -m 11400 = SIP digest authentication (MD5) |
|
philsmd |
General Help
|
4 |
9,893 |
03-02-2016, 08:52 PM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
Is the content also compressed ? How does the hash start ? With $7z$1$19$... (see https://github.com/philsmd/7z2hashcat#explanation-of-the-hash-format) ?
Which version of hashcat do you use ? do yo... |
|
philsmd |
General Talk
|
6 |
855 |
08-29-2020, 07:55 AM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
you could try with --keep-guessing and see how many false positives you get.
Since it's a crc32 checksum it's not impossible (the decompression errors in case of compression of course would prevent... |
|
philsmd |
General Talk
|
6 |
855 |
08-29-2020, 02:07 PM |
|
|
Thread: Recovered a 7z password with hashcat, but it's not the right one
Post: RE: Recovered a 7z password with hashcat, but it's...
it's not really safe to do it this way, but you could for instance use something like this:
Code:
--
hashcat --stdout -a 3 [THE_MASK] | grep -n -m 1 '^[THE_FALSE_POSITVE_PASSWORD]$'
--
then ... |
|
philsmd |
General Talk
|
6 |
855 |
08-30-2020, 09:20 PM |
|
|
Thread: Recovered hashes spreadsheets help
Post: RE: Recovered hashes spreadsheets help
I'm pretty sure you can just open the outfile/potfile with any spreadsheet viewer/editor as a CSV file where the separator is just ":" (or the -p command line value).
I'm not sure why some people n... |
|
philsmd |
hashcat
|
4 |
1,333 |
03-11-2020, 05:06 PM |
|
|
Thread: Recovered hashes spreadsheets help
Post: RE: Recovered hashes spreadsheets help
just to be very clear: you do NOT need any python script to do this.
just open the document as a CSV file (with : as a separator).. Comma-separated values (CSV) files can typically use any sepataor... |
|
philsmd |
hashcat
|
4 |
1,333 |
03-11-2020, 11:42 PM |
|
|
Thread: Recovering an encrypted file
Post: RE: Recovering an encrypted file
hashcat supports veracrypt with the hash modes
Code:
--
137XY | VeraCrypt
X | 1 = PBKDF2-HMAC-RIPEMD160
X | 2 = PBKDF2-HMAC-SHA512
X | 3 = PBKDF2-HMAC-Whirlpool
X | 4 =... |
|
philsmd |
hashcat
|
7 |
5,345 |
11-02-2018, 07:15 PM |
|
|
Thread: Recovery not even starting
Post: RE: Recovery not even starting
First of all, according to the forum rules you are not allowed to post hashes see https://hashcat.net/forum/announcement-2.html
Second, the hash that you use corresponds to a password with 4 characte... |
|
philsmd |
Old oclHashcat Support
|
2 |
4,501 |
03-20-2015, 11:05 PM |
|
|
Thread: Regarding to OS X v10.7/8/9
Post: RE: Regarding to OS X v10.7/8/9
for -m 1722: sha512 ($salt.$pass)
for -m 7100: PBKDF2-HMAC-SHA512
you can find this information all around the web. It is not a secret. |
|
philsmd |
General Help
|
1 |
3,511 |
10-22-2015, 12:29 PM |
|
|
Thread: reject bug when using wordlist + rule attack on WPA/WPA2 hash
Post: RE: reject bug when using wordlist + rule attack o...
rules are applied on GPU for performance reasons (after the fact, after the rejection routine) and we can't really filter each and every combination correctly on GPU (syncing this would be very comple... |
|
philsmd |
hashcat
|
2 |
1,266 |
10-16-2019, 07:38 PM |
|
|
Thread: release 0.15 froze
Post: RE: release 0.15 froze
@mastercracker please have also a look at my comment in https://hashcat.net/trac/ticket/82 , I think those changes we made recently fixed that problem (too)
Can you please run the exact same comman... |
|
philsmd |
Beta Tester
|
14 |
14,534 |
08-29-2013, 04:10 PM |