Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: how to create .rule and .hcmask files
Post: RE: how to create .rule and .hcmask files
I'm pretty sure they were both generated with
PACK (Password Analysis and Cracking Kit): https://github.com/iphelix/pack
https://web.archive.org/web/20190125201146/https://thesprawl.org/projects/pac... |
|
philsmd |
hashcat
|
5 |
1,189 |
04-22-2020, 09:39 PM |
|
|
Thread: How to crack Keepass2 passcode, help me
Post: RE: How to crack Keepass2 passcode, help me
so you are using -m 13400 together with the modified (removed file names etc) output of keepass2john from bleeding-jumbo john the ripper (JTR) ?
Well, it depends if the chars are appended/prepended... |
|
philsmd |
hashcat
|
1 |
933 |
02-25-2020, 06:13 PM |
|
|
Thread: How to crack Apple Secure Notes?
Post: RE: How to crack Apple Secure Notes?
Code:
--
hashcat -m 16200 -a 0 -w 3 -r rules/best64.rule hash_file.txt word_list.txt
--
|
|
philsmd |
hashcat
|
3 |
678 |
07-12-2020, 07:18 PM |
|
|
Thread: How to crack a password in this way with hashcat ?
Post: RE: How to crack a password in this way with hashc...
This trac ticket https://hashcat.net/trac/ticket/539 seems to be related to your question.
The main reasons it wasn't implemented yet, was that the full details about the maximum length devs should... |
|
philsmd |
Old hashcat Support
|
1 |
4,407 |
03-26-2015, 11:50 AM |
|
|
Thread: How to configure Hashcat to append some data?
Post: RE: How to configure Hashcat to append some data?
Code:
--
hashcat -m 1400 -a 3 -w 3 --hex-charset --custom-charset2 30 --custom-charset3 00 7627ffae5981fc58df32ea707d11d1acf72adc76d7b1a31b8a47c9fbd065a4a6 ?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?2?3?3?3?3?... |
|
philsmd |
hashcat
|
4 |
706 |
07-24-2020, 07:23 PM |
|
|
Thread: How to configure Hashcat to append some data?
Post: RE: How to configure Hashcat to append some data?
Quote:
--
But there is a problem running it.
--
Why do you not just mention the error message ?
I guess it's this:
Quote:
--
Integer overflow detected in keyspace of mask: ?2?2?2?2?2?2?2... |
|
philsmd |
hashcat
|
4 |
706 |
07-25-2020, 08:20 AM |
|
|
Thread: How to calc (md5(md5($pwd).$salt) ?
Post: RE: How to calc (md5(md5($pwd).$salt) ?
This is the algorithm used by the forum software/board VBulletin.
Hence, depending on the salt length, you either need to use -m 2611 (very short salts) or -m 2711 (longer salts).
For examples see h... |
|
philsmd |
Old hashcat Support
|
4 |
9,058 |
05-10-2015, 10:42 AM |
|
|
Thread: How to Bruteforce a part-known string?
Post: RE: How to Bruteforce a part-known string?
But it is the exact same thing for other length, if you want to do it in one run use for instance a script like this (untested, remove the "echo" if it seems to be ok for you):
Code:
--
hc_pre="... |
|
philsmd |
Old hashcat Support
|
4 |
11,433 |
06-05-2013, 07:55 PM |
|
|
Thread: how to add custome hash type
Post: RE: how to add custome hash type
Trac is here (https://www.hashcat.net/trac) and you may need to register (https://hashcat.net/trac/register) if not already done (since trac is seperate from the forum and you need to create a new acco... |
|
philsmd |
Old hashcat Support
|
16 |
29,653 |
10-21-2013, 10:18 AM |
|
|
Thread: how to add custome hash type
Post: RE: how to add custome hash type
See https://hashcat.net/wiki/doku.php?id=example_hashes , hashcat supports 2 vbulletin hash modes (both have some restrictions on the salt length etc).
Anyway, by using -m 2611 == vBulletin < v3.8.5... |
|
philsmd |
Old hashcat Support
|
16 |
29,653 |
10-21-2013, 01:27 PM |
|
|
Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...
The only way to know for sure is to have the source code (algorithm, or name and version of the platform, cms etc) that generated the hashes ... or to guess the algorithm by having at least one user f... |
|
philsmd |
hashcat
|
13 |
2,704 |
04-18-2020, 01:25 PM |
|
|
Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...
you are NOT allowed to post hashes. read the forum rules. You will get banned by not following the rules.
As far as I understand, you are saying the algorithm is basically:
Code:
--
echo -n --7... |
|
philsmd |
hashcat
|
13 |
2,704 |
04-18-2020, 03:02 PM |
|
|
Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...
no, the salt must be with the dashes:
[email protected]:848XXXc9e5baf34d6dba20XXX755f4984b6d77cc:--74e3c24fd83d92ea72383e9b3a4292bdfb8exxxx--
if you add users, you need to use --username to skip them.
... |
|
philsmd |
hashcat
|
13 |
2,704 |
04-19-2020, 04:11 PM |
|
|
Thread: how should i crack this type of hash (sha1 & salt)
Post: RE: how should i crack this type of hash (sha1 & s...
6 dashes total = 2+2 (around salt) + 2 (after pass)
the rules only add 2 dashes, that's why I named the file append_two_dashes.txt |
|
philsmd |
hashcat
|
13 |
2,704 |
04-19-2020, 04:34 PM |
|
|
Thread: how make charset?
Post: RE: how make charset?
you could just use a mask file (https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files)
mask_file.hcmask
Code:
--
qweasdzxcmnblkjpoi,~ ,123,1——8 ?1?1?1?1?1?1?1?1 + 1——2 ?... |
|
philsmd |
hashcat
|
3 |
696 |
07-14-2020, 12:09 PM |
|
|
Thread: how make charset?
Post: RE: how make charset?
that's the beauty and nice part of the flexibility of mask files (*.hcmask), you can just add however many mask you want, one after the other, line per line:
if we would only consider a theoretical... |
|
philsmd |
hashcat
|
3 |
696 |
07-14-2020, 07:31 PM |
|
|
Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256
also note that you can't use decrypt with hashes: https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/
something that isn't encrypted, can't in general be decrypted
-m 1400 = S... |
|
philsmd |
hashcat
|
6 |
1,263 |
05-29-2020, 09:15 PM |
|
|
Thread: how long it takes
Post: RE: how long it takes
no, that's not feasible
random data is very difficult to brute-force starting with some (quite "small") lengths and I think you didn't really do the math here:
64 hex would be 16 ^ 64 = 1157920892... |
|
philsmd |
General Talk
|
1 |
842 |
01-19-2020, 12:44 PM |
|
|
Thread: How hashcat work?
Post: RE: How hashcat work?
It's listed here: https://rocm.github.io/hardware.html
I would recommend that you try ROCm: https://rocm.github.io/ROCmInstall.html
you could also first to try if beta fixes the problem : https:... |
|
philsmd |
hashcat
|
17 |
3,930 |
03-22-2020, 03:17 PM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
well, you should at least tell us the password, otherwise it's both against the forum rules and impossible for us to know how to test / verify it.
I would say that looking at the code here https://... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 04:15 PM |