Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Create PKZIP Master Key
Post: RE: Create PKZIP Master Key
you do not use the output of zip2john at all for -m 20500 or -m 20510.
you just use the key that bkcrack will give you if you have succeeded with a known plaintext attack |
|
philsmd |
hashcat
|
4 |
1,849 |
01-14-2020, 03:51 PM |
|
|
Thread: Create a single rule file with maskprocessor
Post: RE: Create a single rule file with maskprocessor
Congratz, you actually found out the "hard way" what the differences between rule and mask attack is (the easy way would be to just read the wiki pages, in this specific case especially these 2 pages:... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
6,701 |
07-24-2016, 11:26 AM |
|
|
Thread: crc32 hash format, No hashes loaded, line length exception?
Post: RE: crc32 hash format, No hashes loaded, line leng...
This is not the correct hash format that you use.
The correct hash format can always be determined by looking at the example hashes here https://hashcat.net/wiki/doku.php?id=example_hashes (or using ... |
|
philsmd |
hashcat
|
2 |
2,586 |
12-05-2017, 04:29 PM |
|
|
Thread: Crash on every exit
Post: RE: Crash on every exit
Hey Kuci,
did you try also w/ catalyst 13.1 (https://support.amd.com/us/gpudownload/windows/previous/13/Pages/radeon_linux.aspx?os=Linux%20x86&rev=13.1 ) as suggested in GPU Driver and SDK Requirement... |
|
philsmd |
Very old oclHashcat-lite Support
|
2 |
7,695 |
06-01-2013, 02:36 PM |
|
|
Thread: Crackpos incorrect
Post: RE: Crackpos incorrect
as you might already know, if you use any amplifier (like rules) the total number of password candidates will increase. This implies also that the "Progress" number in the status screen will get large... |
|
philsmd |
hashcat
|
12 |
5,625 |
02-15-2019, 09:39 AM |
|
|
Thread: cracking Wifi with android phone
Post: RE: cracking Wifi with android phone
(I will only answer the hashcat related part of the question, because this is the hashcat forum.... how you obtain networks traffic captures is another question not related to hashcat at all,,. hint: ... |
|
philsmd |
hashcat
|
2 |
2,328 |
12-20-2018, 09:37 AM |
|
|
Thread: cracking way too fast?
Post: RE: cracking way too fast?
If you use the release version from https://hashcat.net/ you just need to know that this is a known issue and was already fixed: https://github.com/hashcat/hashcat/issues/1178
You can use https://has... |
|
philsmd |
hashcat
|
2 |
3,599 |
03-26-2017, 06:32 PM |
|
|
Thread: Cracking TACACS+ with hashcat
Post: RE: Cracking TACACS+ with hashcat
This is very interesting information and a nice find about how to best filter out "wrong results".
Good job.
Thanks for the research.
I must admit that I didn't have much to do with tacacs+ so ... |
|
philsmd |
User Contributions
|
1 |
6,737 |
11-30-2017, 04:06 PM |
|
|
Thread: Cracking speed
Post: RE: Cracking speed
1. are you sure that the hash file is in the correct format (.hccap format), see https://hashcat.net/wiki/doku.php?id=cracking_wpawpa2 , https://hashcat.net/cap2hccap/ ...
2. screenshot says 0/0 hash... |
|
philsmd |
Old hashcat Support
|
3 |
10,531 |
07-06-2014, 07:09 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
not exactly true royce, it was once implemented as a separate kernel because of some special handling:
see https://hashcat.net/forum/thread-6354.html
and https://github.com/hashcat/hashcat/commit/82... |
|
philsmd |
hashcat
|
7 |
873 |
08-10-2020, 07:07 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
you could use hashcat-legacy with your CPU from https://hashcat.net/files/hashcat-2.00.7z (deprecated, not supported anymore) update: it seems that hashcat-legacy never supported -m 190... or just i... |
|
philsmd |
hashcat
|
7 |
873 |
08-11-2020, 09:57 AM |
|
|
Thread: cracking salted linux shadow hash: Unable to load due to Line-length
Post: RE: cracking salted linux shadow hash: Unable to l...
of course it is salted (the part after "$6$" and before the "$hash" part, i.e. "52450745" for this very specific example is the salt) and the whole sha512crypt hash can be generated like this in pytho... |
|
philsmd |
hashcat
|
5 |
9,574 |
08-11-2016, 09:16 AM |
|
|
Thread: Cracking pdf file with arabic password using hashcat
Post: RE: Cracking pdf file with arabic password using h...
You do not need --hex-salt. This has nothing to do with salts.
If anything you would need --hex-charset, but that is not necessariy and only needed if you define a custom charset (-1, -2, -3 or -4)... |
|
philsmd |
General Talk
|
5 |
16,216 |
11-21-2017, 05:58 PM |
|
|
Thread: Cracking pdf file with arabic password using hashcat
Post: RE: Cracking pdf file with arabic password using h...
this of course depends on what the tool that you use to encrypt the pdf (acrobat reader etc) does with the input. It could use utf-8 by default. it could use utf16-le etc...
The linux echo tool wont ... |
|
philsmd |
General Talk
|
5 |
16,216 |
11-21-2017, 07:27 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
The 5 missing bytes will still be 256 * 256 * 256 * 256 * 256 = 256 ^ 5 = 1099511627776 combinations.
That's a quite huge keyspace, even if the hashing algortihm (keccak) is quite fast.
of course ... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 04:59 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
hashcat uses ?H for 0123456789ABCDEF
therefore you could specify the mask as -a 3 --hex-charset [someting]?H[somethingElse]?H?H02
the main problem now is that the hash mode -m 5000 only supports a... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 05:46 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
the ciphertext gets decrypted into the raw seed if you have the correct password/AES key/
see my perl code https://github.com/hashcat/hashcat/issues/1279#issuecomment-351716733
Code:
--
my $h... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 09:48 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
that's good that you mention this fact/doubt about the private key vs seed, chick3nman
I assumed that the OP (uprising_bike) is sure that s/he has (part of) the seed, not the private key instead (t... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-30-2018, 07:56 AM |
|
|
Thread: Cracking MySQL/MariaDB Hashes
Post: RE: Cracking MySQL/MariaDB Hashes
--increment-min and --increment-max are command line arguments that can be used in a mask attack (-a 3. Well, it is also supported in -a 6 and -a 7 actually, but always together with masks).
if you u... |
|
philsmd |
General Talk
|
2 |
5,985 |
08-04-2017, 07:39 AM |
|
|
Thread: Cracking multiple WPA2 hashes?
Post: RE: Cracking multiple WPA2 hashes?
see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_crack_multiple_wpa_handshakes_at_once
and
https://hashcat.net/wiki/doku.php?id=hccapx |
|
philsmd |
hashcat
|
2 |
3,118 |
10-19-2018, 06:34 PM |