Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt
N3HL Wrote: (01-30-2015, 02:05 PM)
--
im completely new to hashcat, and I noticed it's missing some docs
--
Not at all, the docs are:
1. https://hashcat.net/wiki/
2. --help output of oclHashcat or c... |
|
philsmd |
Old hashcat Support
|
9 |
47,256 |
01-30-2015, 04:43 PM |
|
|
Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt
you could use the --username switch of hashcat/oclHashcat.
input format (you must use the --username switch to crack the hashes):
username:hash:salt
second step (after cracking); you can output it w... |
|
philsmd |
Old hashcat Support
|
9 |
47,256 |
01-30-2015, 05:45 PM |
|
|
Thread: Get plain text password knowing hash and salt
Post: RE: Get plain text password knowing hash and salt
--show is always used to show the cracks for a specific oclHashcat session after the actual cracking process is done.
So it would look like this:
oclHashcat64.exe -m 2811 --username hashes.txt dict.... |
|
philsmd |
Old hashcat Support
|
9 |
47,256 |
01-30-2015, 06:24 PM |
|
|
Thread: Generator of fortune
Post: RE: Generator of fortune
what's going on here? one (actually 2) completely new forum accounts without any previous posts suddently talking about a tool with very strange description and furthermore a tool that was already con... |
|
philsmd |
User Contributions
|
8 |
2,022 |
06-15-2020, 11:06 AM |
|
|
Thread: Generator mscash2?
Post: RE: Generator mscash2?
1. you are not allowed to post hashes here (see https://hashcat.net/forum/announcement-2.html ), why can't you just say what the problem is (or at least mask the hash) ?
2. The error probably says line... |
|
philsmd |
General Help
|
3 |
11,612 |
08-16-2013, 08:20 PM |
|
|
Thread: Generating dictonary
Post: RE: Generating dictonary
The best solution is to use mask attack: https://hashcat.net/wiki/doku.php?id=mask_attack
Code:
--
hashcat -m 0 -a 3 hash.txt ?u?u?u?u?u?u?u?u
--
|
|
philsmd |
General Talk
|
12 |
8,565 |
07-25-2018, 07:27 PM |
|
|
Thread: full parallel power of device
Post: RE: full parallel power of device
-a 3 means mask attack (https://hashcat.net/wiki/doku.php?id=mask_attack)
so what you basically did is run a dictionary (the dictionary attack would be -a 0) with -a 3, i.e. run each word in the ma... |
|
philsmd |
hashcat
|
6 |
1,844 |
12-23-2019, 08:54 AM |
|
|
Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?
Status...........: Cracked
it's very obvious if it's cracked or not |
|
philsmd |
hashcat
|
9 |
3,254 |
09-05-2019, 12:51 PM |
|
|
Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash
it's hash mode -m 7100 | OSX v10.8, OSX v10.9, OSX v10.10 | Operating-Systems
also see https://hashcat.net/wiki/example_hashes for example hashes (search for OS X v10.8 / v10.9) |
|
philsmd |
hashcat
|
5 |
8,048 |
01-24-2017, 09:30 PM |
|
|
Thread: Formatting a salted SHA 512 hash
Post: RE: Formatting a salted SHA 512 hash
You can "truncate"/cut the hash itself @ the same length used by the example hash :) |
|
philsmd |
hashcat
|
5 |
8,048 |
01-24-2017, 09:56 PM |
|
|
Thread: format username:password?
Post: RE: format username:password?
https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
btw: https://www.techsolvency.com/p... |
|
philsmd |
hashcat
|
3 |
151 |
Yesterday, 12:31 PM |
|
|
Thread: format username:password?
Post: RE: format username:password?
just make sure that the input is correct and also remember that the way to do it is 2-fold (2 steps are needed ), i.e. first crack such that the cracked hashes with password end up in the .potfile, on... |
|
philsmd |
hashcat
|
3 |
151 |
10 hours ago |
|
|
Thread: foreign words and --remove
Post: RE: foreign words and --remove
for question number 1 it depends on the type of hashes and also on your hardware (SSD, RAM, CPU) etc. In my experience, you shouldn't bother too much about removing hashes if you do not crack (and the... |
|
philsmd |
hashcat
|
3 |
3,868 |
08-09-2017, 08:57 AM |
|
|
Thread: Floating Mask. How to?
Post: RE: Floating Mask. How to?
What you (@agenta) should consider is that this "floating technique" in theory is efficient/meaningful/clever only if the (different) charsets you are using (in your specific case there are 2, ?a and ... |
|
philsmd |
General Talk
|
8 |
11,643 |
03-01-2016, 12:43 PM |
|
|
Thread: First Attempt, does this look alright?
Post: RE: First Attempt, does this look alright?
you could use mask files https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
or just set
-1 "012345 6789" for the first byte of your mask (i.e. any set of chars, charset, that ha... |
|
philsmd |
hashcat
|
8 |
1,060 |
07-16-2020, 08:03 PM |
|
|
Thread: First Attempt, does this look alright?
Post: RE: First Attempt, does this look alright?
yeah, your command doesn't make sense to me at all.
Why would you define all those custom charsets (-1 , -2 , -3 , -4) and only use ?4 in your mask ? That seems to be a misunderstanding/problem of ... |
|
philsmd |
hashcat
|
8 |
1,060 |
07-16-2020, 08:29 PM |
|
|
Thread: First Attempt, does this look alright?
Post: RE: First Attempt, does this look alright?
The main problem now is that it's quite a long password.
We "normally"/generally say that a length of 8-9 is the max that can be brute-forced (but attention: this depends a lot on hash type and/or ... |
|
philsmd |
hashcat
|
8 |
1,060 |
07-16-2020, 11:19 PM |
|
|
Thread: FIFO help
Post: RE: FIFO help
If you are using just a few rules (or possibly even just 1), you can use -j/-k together with -a1 for each and every rule:
Code:
--
hashcat -m 1000 -a 1 -w 4 -j "$1 $2 $3" hash.txt dict1.txt dict2.tx... |
|
philsmd |
hashcat
|
3 |
4,472 |
05-25-2017, 11:01 AM |
|
|
Thread: FIFO help
Post: RE: FIFO help
As said, the first approach (with -j/-k) should be used if you plan to use only very few rules: i.e. you can start hashcat a couple of times (one after the other in a sequence, or loop if you prefer) ... |
|
philsmd |
hashcat
|
3 |
4,472 |
05-26-2017, 07:44 AM |
|
|
Thread: feature request: new hashtype support SSHA512 (LDAP)
Post: RE: feature request: new hashtype support SSHA512 ...
I made some test w/ this format... it seems very similar to the supported -m 1710 format (except the output format, but this is just a matter of fast conversion - base64 -d).
See example here:
https:... |
|
philsmd |
General Help
|
5 |
11,493 |
08-09-2013, 01:50 PM |