Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Help using oclhashcat .hccap file
Post: RE: Help using oclhashcat .hccap file
1. use hashcat 3.40 (or higher, beta: https://hashcat.net/beta/)
2. use hccapx files (convert your caps with cap2hccapx from hashcat-utils or the converter: https://hashcat.net/cap2hccapx/
3. use some... |
|
philsmd |
hashcat
|
3 |
4,320 |
03-23-2017, 03:35 PM |
|
|
Thread: Help using --increment in the middle of a text file
Post: RE: Help using --increment in the middle of a text...
If you always want to insert numbers exactly at position 6, you could generate some rules on the fly like this (attention: with longer numbers and additional insert positions - in addition to position... |
|
philsmd |
General Talk
|
3 |
4,606 |
05-15-2017, 02:27 PM |
|
|
Thread: Help using --increment in the middle of a text file
Post: RE: Help using --increment in the middle of a text...
Of course you need to use maskprocessor correctly (depending on the shell you use).
E.g. if you use windows, you might need to quote differently, e.g. like this:
Code:
--
mp64 "i5?d i6?d i7?d i... |
|
philsmd |
General Talk
|
3 |
4,606 |
05-15-2017, 08:01 PM |
|
|
Thread: Help to BruteForce WPA
Post: RE: Help to BruteForce WPA
The up-to-date version of maskprocessor can always be downloaded from: https://hashcat.net/wiki/doku.php?id=maskprocessor
You can use this as mp64.exe -q 2 ?u?u?u?u?u?u?u?u to:
1. create a dict (might... |
|
philsmd |
Old oclHashcat Support
|
8 |
29,750 |
02-23-2014, 01:27 PM |
|
|
Thread: Help to BruteForce WPA
Post: RE: Help to BruteForce WPA
mp64.exe -q 2 ?u?u?u?u?u?u?u?u | oclHashcat64.exe -m 2500 -u 4096 -n 32 --status --status-timer 3 wpa.hccap
And it will show you the status every 3 seconds...
Please remember you use stdin mode, ther... |
|
philsmd |
Old oclHashcat Support
|
8 |
29,750 |
02-23-2014, 05:26 PM |
|
|
Thread: Help performing a mask-attack on 1 MD5
Post: RE: Help performing a mask-attack on 1 MD5
you should have a look here:
https://hashcat.net/wiki/doku.php?id=mask_attack
especially the .hcmask file section could be interesting too:
https://hashcat.net/wiki/doku.php?id=mask_attack#hashca... |
|
philsmd |
hashcat
|
1 |
1,331 |
12-27-2018, 10:45 AM |
|
|
Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax
Are you sure you are using the latest version of hashcat?
What do you mean by too long? How long is your salt ? |
|
philsmd |
hashcat
|
10 |
6,738 |
03-29-2018, 04:29 PM |
|
|
Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax
please make sure that the file hash.txt is located in the correct directory and is really named like this.
It happens all the time that users save the file within a different folder or with a sligh... |
|
philsmd |
hashcat
|
10 |
6,738 |
03-29-2018, 04:06 PM |
|
|
Thread: Help modifying a .restore file?
Post: RE: Help modifying a .restore file?
the main problem with your command:
Code:
--
hashcat64 -d 1 -m 14800 -a 3 -w 3 --session itunes backuphash.txt
--
is that you didn't specify a mask at all. mask attacks are really most useful ... |
|
philsmd |
hashcat
|
2 |
1,700 |
09-16-2019, 07:50 PM |
|
|
Thread: Help me to crack those hashes please
Post: RE: Help me to crack those hashes please
banned (1 week, use it wisely to read and understand the forum rules) and thread closed |
|
philsmd |
hashcat
|
2 |
2,628 |
04-10-2017, 02:55 PM |
|
|
Thread: Help me install hxctools
Post: RE: Help me install hxctools
well, this is the hashcat forum. so you won't get too much help here (hcxtools is a 3rd party tool).
I would suggest that you just install the headers / dev / libs package too like "libssl-dev".
... |
|
philsmd |
hashcat
|
3 |
1,608 |
08-26-2019, 03:01 PM |
|
|
Thread: Help me about --show
Post: RE: Help me about --show
The correct syntax is different. You need to specify the hash type, --show and the original hash list.
Code:
--
hashcat -m 100 --show unmodified_hashes.txt
--
without the original hash list,... |
|
philsmd |
hashcat
|
1 |
1,237 |
01-18-2019, 09:55 AM |
|
|
Thread: help me
Post: RE: help me
just do NOT specify the file name. see https://hashcat.net/wiki/example_hashes or run:
Code:
--
hashcat -m 10500 --example-hashes
--
to see an example hash (note: there is no file name within th... |
|
philsmd |
hashcat
|
1 |
874 |
03-13-2020, 11:30 AM |
|
|
Thread: Help implementing FNV1 for a3 mode
Post: RE: Help implementing FNV1 for a3 mode
I would suggest to start with some simple hash types that involve md5/sha1 etc...
In general there are some algorithms listed here, that are not already implemented: https://github.com/hashcat/has... |
|
philsmd |
hashcat
|
1 |
560 |
05-04-2020, 07:11 PM |
|
|
Thread: Help identifying hash type!
Post: RE: Help identifying hash type!
According to the forum rules, which you have accepted, you are not allowed to post hashes.
See https://hashcat.net/forum/announcement-2.html
Please take a week off and re-read the forum rules. They a... |
|
philsmd |
General Help
|
1 |
4,113 |
12-11-2014, 12:55 PM |
|
|
Thread: Help for rule
Post: RE: Help for rule
Code:
--
hashcat --stdout -a 3 -1 ?l?d?u "^?1 ^?1"
--
|
|
philsmd |
General Talk
|
10 |
6,459 |
07-07-2018, 08:17 PM |
|
|
Thread: Help figuring out TOPT (HMAC-SHA1)
Post: RE: Help figuring out TOPT (HMAC-SHA1)
see https://www.unix-ninja.com/p/attacking_google_authenticator |
|
philsmd |
hashcat
|
1 |
1,726 |
12-05-2018, 09:09 AM |
|
|
Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example
Post: RE: Help explain the PBKDF2-HMAC-SHA1 hash-example
the format is:
sha1:[iteration count]:[salt in base64]:[digest in base64]
therefore the hash is:
sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY=
this can be cracked with:
Code:
--
hashcat ... |
|
philsmd |
hashcat
|
4 |
2,620 |
02-11-2019, 10:59 PM |
|
|
Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512
1. why are you trying to crack the hash? can't you just replace the hash with a known hash and login ? Is it important that you know the password ?
2. your rule command/syntax is completely wrong. yo... |
|
philsmd |
hashcat
|
4 |
3,707 |
02-20-2019, 10:07 AM |
|
|
Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512
1. what is your goal here? do you need to do forensic analysis or just need to get your data back and login ? I think if you are not using full-disk-encryption you could trick the system by giving it ... |
|
philsmd |
hashcat
|
4 |
3,707 |
02-20-2019, 10:52 PM |