Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
so you know exactly 4 "bytes" of 8 bytes of the key ? (just remember that of the 8 "bytes" == 8 * 8 bits = 64 bits, 8 of them are parity bits, therefore it's 8*8 - 8 = 64 bits - 8 bits = 56 bits). we ... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 08:39 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
now you are confusing ciphertext and plaintext
the format of -m 14000 hashes is
8_bytes_ciphertext_in_hex:8_bytes_plaintext_in_hex |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 09:02 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
yeah, that would work, you just generate the set of hashes with different right part ("salt" aka ciphertext) and try to crack those hashes. In theory it shouldn't be 65536 if the plaintext wasn't rand... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 09:15 AM |
|
|
Thread: DES with partial plain text
Post: RE: DES with partial plain text
yeah, it could work... but also the kernel would need to loop over these 256*256 combinations (16 bits) = 65536
which of course would imply a kernel runtime of 65536 times longer :(
That means h... |
|
philsmd |
hashcat
|
11 |
1,633 |
06-15-2020, 11:54 AM |
|
|
Thread: DES Hash
Post: RE: DES Hash
descrypt is -m 1500 = descrypt, DES (Unix), Traditional DES
the salt is already within the first chars of the "hash", so no need to repeat it (i.e. no need for sd : sd..., it's just the second part... |
|
philsmd |
hashcat
|
2 |
1,690 |
02-08-2019, 08:52 PM |
|
|
Thread: Delete character using rule "s"
Post: RE: Delete character using rule "s"
Code:
--
@,
--
https://hashcat.net/wiki/doku.php?id=rule_based_attack (purge) |
|
philsmd |
hashcat
|
2 |
1,004 |
03-10-2020, 11:18 AM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
are you talking about the hashing algorithm -m 2500 = WPA/WPA2 ?
what is your command ? -a 3 ?
can you please copy-paste the status screen that you see in here ? |
|
philsmd |
hashcat
|
21 |
6,238 |
09-17-2019, 10:03 PM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
I don't understand what the problem is and what you are seeing. This is your statement:
Quote:
--
why is it guessing passwords that are only two characters
--
but your screenshot clearly says ... |
|
philsmd |
hashcat
|
21 |
6,238 |
09-18-2019, 08:28 AM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
Let's try to verify your claim. you said that the dictionary file does not contain any passwords shorter than 8 characters.
so let's try to run hashcat without any rule file and see how much reject... |
|
philsmd |
hashcat
|
21 |
6,238 |
09-19-2019, 09:12 AM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
yeah, but that's a different story. that wouldn't explain the 15 % rejected with the wordlist where s/he claims "I removed the words under eight". |
|
philsmd |
hashcat
|
21 |
6,238 |
09-19-2019, 12:32 PM |
|
|
Thread: Defining character length.
Post: RE: Defining character length.
just look it up here: https://hashcat.net/wiki/doku.php?id=rule_based_attack
every rule that shortens the password, especially the "Truncate" rules "[" and "]" are able to generate passwords with "... |
|
philsmd |
hashcat
|
21 |
6,238 |
09-22-2019, 09:40 AM |
|
|
Thread: Defining an algorithim
Post: RE: Defining an algorithim
... pro tip: with oclHashcat-plus and a .hcmask file (https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files) you could do it all at once (one run of oclHashcat-plus only ;) ).
Code:
--
... |
|
philsmd |
Very old oclHashcat-lite Support
|
10 |
22,487 |
09-26-2013, 07:28 AM |
|
|
Thread: Defining an algorithim
Post: RE: Defining an algorithim
You can use any text editor you want to create a file called my.hcmask (or whatever you want to call it), put the content I just showed you:
Code:
--
?l?u?d,?d-?1?1?1?1?1?1?1?1?1?1
?l?u?d,1?d-?1?1?1... |
|
philsmd |
Very old oclHashcat-lite Support
|
10 |
22,487 |
09-26-2013, 07:40 AM |
|
|
Thread: Defaults for -a3
Post: RE: Defaults for -a3
Is there anything wrong w/ the values specified here: https://hashcat.net/wiki/doku.php?id=oclhashcat#default_values
Note: ?3 is the same as --custom-charset3
Also the full mask is and was there... |
|
philsmd |
Old oclHashcat Support
|
2 |
6,669 |
12-12-2013, 09:20 PM |
|
|
Thread: decryption mechanism in wpa & wpa2
Post: RE: decryption mechanism in wpa & wpa2
the answer is
4. it uses markov chains (so not really random) if you didn't use --markov-disable
EDIT: btw this has not specifically to do only with wpa; markov chains are enabled for every hash ty... |
|
philsmd |
Old oclHashcat Support
|
1 |
3,929 |
01-26-2015, 11:28 AM |
|
|
Thread: Decrypt this... five figure reward
Post: RE: Decrypt this... five figure reward
This is against the forum rules.
The forum here is a hashcat/oclHashcat support and discussion forum, you should have easily figured that out when you accepted the hashcat.net forum's rules: https://... |
|
philsmd |
General Talk
|
1 |
3,772 |
03-20-2016, 07:53 PM |
|
|
Thread: Decrypt DES-CBC RSA private key
Post: RE: Decrypt DES-CBC RSA private key
RSA is not supported.
-m 1500 = descrypt is something completely diffrerent.
we actually have a feature request for RSA here: https://github.com/hashcat/hashcat/issues/108 , but it doesn't seem ... |
|
philsmd |
hashcat
|
4 |
7,035 |
05-24-2019, 02:59 PM |
|
|
Thread: DCC2 Cracking from a file not working
Post: RE: DCC2 Cracking from a file not working
you are probably using the wrong file. the error messages clearly mentions a different hash
btw: you are not allowed to post hashes here, see forum rules (it doesn't matter if it is just an example... |
|
philsmd |
hashcat
|
1 |
823 |
02-07-2020, 06:56 PM |
|
|
Thread: DCC2 - 2100 only using one GPU on multi GPU systems
Post: RE: DCC2 - 2100 only using one GPU on multi GPU sy...
what attack type (-a x) ? What input ? How large is the mask/dict(s) ?
Maybe try using this:
Code:
--
-S
--
but the speed will/could suffer a lot with -S.
I guess you could just optimize... |
|
philsmd |
hashcat
|
5 |
712 |
08-02-2020, 11:34 PM |
|
|
Thread: DCC2 - 2100 only using one GPU on multi GPU systems
Post: RE: DCC2 - 2100 only using one GPU on multi GPU sy...
did you try -S ?
maybe a solution is to pre-compute something to generate a larger dict from the small dict. pipe could also be an option, but let's be honest both -S and pipes normally are only be... |
|
philsmd |
hashcat
|
5 |
712 |
08-04-2020, 09:47 PM |