Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
mask attack: the candidates are directly generated/used on GPU, within the GPU kernel code
attack involving dictionaries (-a 0, -a 1, -a 6, -a 7): disk I/O bottleneck AND passwords need to be "send"/... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-06-2020, 12:41 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
if you have some specific idea, you could also develop/program your own password generator (for instance a python script or whatever) and pass the candidates to hashcat like this:
Code:
--
pytho... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:33 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
no, mask attack would be MUCH, MUCH faster if you just try "random passwords". every operation involving the disk would slow it down tremendously as already explained above when we compared -a 3 with ... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:28 PM |
|
|
Thread: fastest way to crack bcrypt
Post: RE: fastest way to crack bcrypt
it's very difficult / dangerous to make comparison like this. What are you comparing to? dozens of hashes against 1 hash, cost factor 5 (2^5 = 32) against cost factor 19 (2^19 = 524288 "iterations").... |
|
philsmd |
hashcat
|
3 |
952 |
06-29-2020, 09:35 AM |
|
|
Thread: fastest way to crack bcrypt
Post: RE: fastest way to crack bcrypt
yeah, very very good explanation @Mem5. your post is perfect because it explains what I forgot to mention above...
From my experience from the last couple of months/years, is that some people confu... |
|
philsmd |
hashcat
|
3 |
952 |
06-29-2020, 10:50 AM |
|
|
Thread: Extract PDF hash (edit passwd)
Post: RE: Extract PDF hash (edit passwd)
It seems that the differences between the algorithms used for checking the owner password (- editing - permissions) compared to the user password (password to open the file aka encrypted PDFs) at leas... |
|
philsmd |
hashcat
|
13 |
59,850 |
01-26-2017, 06:03 PM |
|
|
Thread: Extract all passwords from potfile
Post: RE: Extract all passwords from potfile
that's incorrect.
--show only considers the hashes matching the current hash type and hash list (hash.txt):
Code:
--
hashcat -m 0 --show --outfile-format 2 hash.txt
--
|
|
philsmd |
hashcat
|
4 |
3,187 |
02-16-2019, 03:34 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
just create the hashcat mask file (a.hcmask) manually:
Code:
--
?l?u,?l?d,?1?a?a?a?a?2?2?2
?l?u,?l?d,?1?a?a?a?a?a?2?2?2
?l?u,?l?d,?1?a?a?a?a?a?a?2?2?2
--
Code:
--
hashcat -m 2500 -a 3 -w ... |
|
philsmd |
hashcat
|
11 |
2,910 |
09-21-2019, 07:50 PM |
|
|
Thread: Exploiting the human factor
Post: RE: Exploiting the human factor
lol, it will take 11 days just for the first one
that's also why brute-force is not usually the best strategy, but it of course depends a lot on the info you have and especially how confident you a... |
|
philsmd |
hashcat
|
11 |
2,910 |
09-21-2019, 09:04 PM |
|
|
Thread: Exit status code
Post: RE: Exit status code
here we just need to distinguish between the process exit code ($? variable) and the status that hashcat internally uses:
1. if you check the process exit code, you need to follow this list: https://... |
|
philsmd |
hashcat
|
3 |
651 |
07-16-2020, 11:27 AM |
|
|
Thread: Exit status code
Post: RE: Exit status code
no, this code is returned directly from the process, your shell is able to give you the results:
linux
Code:
--
hashcat example0.hash example.dict
echo $?
--
on windows it seems to be ... |
|
philsmd |
hashcat
|
3 |
651 |
07-16-2020, 01:57 PM |
|
|
Thread: Exfiltration of target material
Post: RE: Exfiltration of target material
wherever possible it makes sense to not invent a new hash format. so it makes sense to use the same signature and data parts/salts etc in the hashcat format like in the jtr format. it doesn't make sen... |
|
philsmd |
hashcat
|
3 |
1,375 |
10-17-2019, 10:12 PM |
|
|
Thread: Exfiltration of target material
Post: RE: Exfiltration of target material
office2john.py
7z2hashcat.py
blockchain2john.py
bitcoin2john.py
1password2john.py
itunes_backup2hashcat.pl
etc
it depends on your hash type
they can be found on the internet very easily (jus... |
|
philsmd |
hashcat
|
3 |
1,375 |
10-17-2019, 08:49 PM |
|
|
Thread: Ethereum Wallet and 1080ti trouble
Post: RE: Ethereum Wallet and 1080ti trouble
It's called the cost factor (N, r, p parameters of scrypt).
your hash is probably: $ethereum$s*262144*1*8
their hash is: $ethereum$s*8192*8*1*
it's important to compare similar things, not apple ... |
|
philsmd |
hashcat
|
4 |
1,626 |
02-15-2020, 12:15 PM |
|
|
Thread: Ethereum Scrypt Hardware Opinion
Post: RE: Ethereum Scrypt Hardware Opinion
For CPUs it's normally quite easy to decide which hardware performs better and is more cost efficient. You could actually just have a look at some benchmark sites and choose a OpenCL-compatible CPU th... |
|
philsmd |
Hardware
|
11 |
10,478 |
01-11-2018, 12:11 PM |
|
|
Thread: ethereum scrypt
Post: RE: ethereum scrypt
in general, you shouldn't send these types of hashes to anybody, because the hash line itself contains sensitive data... this is especially true for several cryptocurrency "hashes". |
|
philsmd |
hashcat
|
4 |
708 |
07-27-2020, 08:37 AM |
|
|
Thread: ethereum scrypt
Post: RE: ethereum scrypt
unfortunately, there is no complete list.
The problem in most cases isn't the hash format, but the algorithm that needs the "encrypted data" to make it possible to verify if the password is correct... |
|
philsmd |
hashcat
|
4 |
708 |
07-27-2020, 12:18 PM |
|
|
Thread: ETH wallet - Salt-length exception
Post: RE: ETH wallet - Salt-length exception
As far as I know all these three fields: salt, ciphertext, mac
should be 32 bytes (and therefore 64 hexadecimal characters) long.
Maybe the fields need to be prefixed with zeros if they are shorte... |
|
philsmd |
hashcat
|
2 |
2,498 |
12-08-2017, 08:49 PM |
|
|
Thread: Estimate Time Is Super Slow
Post: RE: Estimate Time Is Super Slow
you probably also need to install the ICD separately, e.g.
sudo apt install nvidia-opencl-icd-390
or ocl-icd-dev, ocl-icd-opencl-dev (i'm not totally sure which you need, but the nvidia one seems... |
|
philsmd |
hashcat
|
18 |
8,556 |
01-23-2019, 01:10 PM |
|
|
Thread: ERROR: usually high number of arguments within restore file
Post: RE: ERROR: usually high number of arguments within...
"Unusually high number of arguments"
means that you corrupted the .restore file.
maybe your text editor did some strange things to the restore file (which contains binary data too)
It's actuall... |
|
philsmd |
hashcat
|
1 |
784 |
12-23-2019, 07:02 PM |