Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Cracking hash
Post: RE: Cracking hash
do not post any hashes: https://hashcat.net/forum/announcement-2.html |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
2,644 |
04-06-2020, 09:13 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
The command makes no sense.
Defining any custom charset like --custom-charset1 (or short -1) without using it within the mask doesn't make any sense and is actually quite a common user mistake. :(
... |
|
philsmd |
hashcat
|
7 |
1,538 |
05-10-2020, 07:29 AM |
|
|
Thread: Cracking Android Pattern Hash
Post: RE: Cracking Android Pattern Hash
Hi budabob07,
I don't think that there is something special w/ the pattern hashes... Maybe the only thing that you could argue is that they are (ALSO) special insecure...
I mean, it is correct that t... |
|
philsmd |
Very old oclHashcat-lite Support
|
5 |
21,750 |
03-24-2013, 01:31 PM |
|
|
Thread: Cracking an OS X 10.8.2 PBKDF2 Hash
Post: RE: Cracking an OS X 10.8.2 PBKDF2 Hash
The wiki clearly says what hash mode you should use: https://hashcat.net/wiki/doku.php?id=example_hashes
7100 OS X v10.8
So you need -m 7100 in your command line...
Furthermore, if you want to u... |
|
philsmd |
Old oclHashcat Support
|
5 |
14,790 |
12-12-2013, 08:28 PM |
|
|
Thread: Cracking 10 digit password with CudaHashcat
Post: RE: Cracking 10 digit password with CudaHashcat
See https://hashcat.net/wiki/doku.php?id=mask_attack
According to that wiki, you should just use a mask that includes those chars/numbers, i.e:
760?d?d?d?d?d?d?d
Full command:
cudahashcat --h... |
|
philsmd |
Old oclHashcat Support
|
7 |
21,695 |
08-20-2014, 04:22 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
which --brain-client-features are you using ?
you must be more precise when you make such statements |
|
philsmd |
hashcat
|
9 |
2,508 |
10-17-2019, 06:19 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
furthermore, if you are looking for distributed cracking, you better consider using hashtopolis or similars (hashtopolis also has support for brain features as far as I know).
brain is not meant to... |
|
philsmd |
hashcat
|
9 |
2,508 |
10-17-2019, 06:25 PM |
|
|
Thread: Cracked Passwords when using Brain
Post: RE: Cracked Passwords when using Brain
no, this has nothing to do with --restore and -2 and -3 are also very different things (--custom-charset1 ... --custom-charset4).
you need to specify --brain-client-features 1 or --brain-client-fea... |
|
philsmd |
hashcat
|
9 |
2,508 |
10-17-2019, 06:28 PM |
|
|
Thread: Cracked hashes during hashcat --restore not written to potfile
Post: RE: Cracked hashes during hashcat --restore not wr...
Code:
--
./hashcat
--
is different from
Code:
--
hashcat
--
if installed, the $HOME/.hashcat/ directory is used:
https://github.com/hashcat/hashcat/commit/0c65bc6ba3fd5c9068f751346d0533c... |
|
philsmd |
hashcat
|
10 |
657 |
09-19-2020, 10:56 PM |
|
|
Thread: Cracked hashes during hashcat --restore not written to potfile
Post: RE: Cracked hashes during hashcat --restore not wr...
did you copy the hashcat.restore file from another directory ?
The .restore file contains a path from which hashcat was originally launched (cwd, see https://hashcat.net/wiki/doku.php?id=restore#sc... |
|
philsmd |
hashcat
|
10 |
657 |
09-20-2020, 09:08 AM |
|
|
Thread: crack rar
Post: RE: crack rar
Why do you claim that it is not working ?
It is working perfectly fine with -m 12500 = RAR3-hp
The hash even has the signature ($RAR3$*0*) that makes it very clear that no other mode than -m 12500 sh... |
|
philsmd |
hashcat
|
5 |
10,703 |
07-21-2016, 01:45 PM |
|
|
Thread: crack excel password with hashcat, possible?
Post: RE: crack excel password with hashcat, possible?
Code:
--
python office2hashcat.py the_path_to_your_excel_file_here.xls
--
|
|
philsmd |
General Talk
|
6 |
23,546 |
06-30-2017, 09:17 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
The general idea is good @backtraffic... but ...
we really are trying hard to discourage the use of hardware without (good) cooling solutions here. so it's probably better to say: do NOT use any l... |
|
philsmd |
hashcat
|
11 |
8,625 |
01-03-2020, 11:48 AM |
|
|
Thread: CPU v GPU configuration
Post: RE: CPU v GPU configuration
hashcat currently supports these attack modes:
-a 0 dict.txt
-a 1 dict1.txt dict2.txt
-a 3 ?a?a?a?a?a
-a 6 dict.txt ?a?a?a?a?a
-a 7 ?a?a?a?a?a dict.txt
you did use NONE (including the mask and... |
|
philsmd |
hashcat
|
5 |
4,468 |
08-16-2018, 08:26 AM |
|
|
Thread: CPU device not available
Post: RE: CPU device not available
you need to install the drivers as mentioned in https://hashcat.net/hashcat/
https://software.intel.com/en-us/articles/opencl-drivers#cpu-section
current win driver at time of this writing: http:/... |
|
philsmd |
hashcat
|
4 |
1,197 |
04-28-2020, 11:51 AM |
|
|
Thread: CPU device not available
Post: RE: CPU device not available
Please install the nvidia driver directly from https://www.nvidia.com/Download/index.aspx
also see https://hashcat.net/faq/wrongdriver if installing the GPU driver doesn't work immediately |
|
philsmd |
hashcat
|
4 |
1,197 |
04-28-2020, 02:00 PM |
|
|
Thread: CPU advantage
Post: RE: CPU advantage
I would say in mostly all of the cases even slow hashes are faster on GPU.\
so the statement about slow hashes being faster on CPU is (in general) completey incorrect.
There are only few excepti... |
|
philsmd |
hashcat
|
3 |
818 |
03-29-2020, 08:54 AM |
|
|
Thread: Couple of questions
Post: RE: Couple of questions
no, PMKID is not specific to WPA3.
As far as I know you just capture the network traffic with https://github.com/ZerBea/hcxdumptool and convert the capture file to hashes with https://github.com/Ze... |
|
philsmd |
hashcat
|
8 |
2,671 |
02-21-2020, 08:20 AM |
|
|
Thread: Couldn't make SIP Digest work on hashcat
Post: RE: Couldn't make SIP Digest work on hashcat
well, who says that the example and passwords are correct on that page? It could be just a tutorial without a working hash/password.
Indeed, I tried with sipcrack and it doesn't crack with that pas... |
|
philsmd |
hashcat
|
4 |
3,311 |
07-23-2018, 05:36 PM |
|
|
Thread: could someone help me with a mask?
Post: RE: could someone help me with a mask?
btw, somebody - a while ago - even added a further explanation section to the FAQ (frequently asked questions) page to explain (again, in theory it is redundant, but it seems not?) the .hcmask syntax ... |
|
philsmd |
General Help
|
11 |
13,518 |
07-23-2015, 10:25 PM |