Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...
(you should use ?1 if you set -1 ) |
|
philsmd |
hashcat
|
7 |
4,636 |
11-23-2018, 11:41 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
yeah.
but even for the approach with testing first password candidates at the end, you could actually just use -s / -l until the whole keyspace was tested, i.e. split your keyspace in x chunks and te... |
|
philsmd |
hashcat
|
9 |
1,579 |
04-26-2020, 03:39 PM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
Furthermore, the left side is changed most frequently.
Is there any reason why you would need to change the order ?
You might be able to create a new hcstat2 file with hcstat2gen from hashcat-ut... |
|
philsmd |
hashcat
|
9 |
1,579 |
04-26-2020, 09:03 AM |
|
|
Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...
The --keyspace , --skip and --limit usage is very intuitive.
You just first determine the total "keyspace" (https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace) with ... |
|
philsmd |
hashcat
|
9 |
1,579 |
04-27-2020, 08:54 AM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
does it work with -D 1 added to the command line:
Code:
--
hashcat -m 1000 -a 3 -O -D 1 easyntlm.txt ?l?l?l?l
--
To me this really seems like a (very dangerous) driver bug. since the self-test... |
|
philsmd |
hashcat
|
8 |
1,281 |
06-25-2020, 12:20 AM |
|
|
Thread: Bruteforce not finding simple 4 letter hash?
Post: RE: Bruteforce not finding simple 4 letter hash?
the -D 1 parameter does whitelist your CPU device (the Intel i7) cpu (see --help for all the command line parameters that hashcat supports and what they mean).
that means that with -D 1 you are testi... |
|
philsmd |
hashcat
|
8 |
1,281 |
06-25-2020, 12:49 AM |
|
|
Thread: bruteforce mode strange behavior
Post: RE: bruteforce mode strange behavior
you need to quote the -1 argument otherwise the command line will interpret some characters as special commands. |
|
philsmd |
Old oclHashcat Support
|
1 |
5,048 |
12-27-2013, 07:58 AM |
|
|
Thread: Bruteforce + dictionary attack
Post: RE: Bruteforce + dictionary attack
you should be able to find the answer to your problem in the wiki https://hashcat.net/wiki/ |
|
philsmd |
Old oclHashcat Support
|
3 |
5,972 |
12-11-2014, 10:55 PM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just
sha256 (sha256 (sha256 ($pass)))
and therefore tripple sha256
I do not have an example hash, ... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 12:18 AM |
|
|
Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...
Well, there is no secret at all. The neo code is open source and even already linked above.
Here for instance is the verify function:
https://github.com/neo-project/neo/blob/06a900b0043b60865c35e6... |
|
philsmd |
hashcat
|
8 |
6,872 |
02-13-2018, 10:08 AM |
|
|
Thread: Brute Forcing LM/NTLM with non ASCII Characters
Post: RE: Brute Forcing LM/NTLM with non ASCII Character...
if you want to change kernel files that are using sha512_update_global_utf16le_swap into kernel files that use sha512_update_global_swap (without utf16le), you would need to change it for every attack... |
|
philsmd |
hashcat
|
2 |
538 |
07-31-2020, 04:35 PM |
|
|
Thread: Brute Force WPA2
Post: RE: Brute Force WPA2
no
1. --incremental is not a valid oclHashcat switch, I think you mean --increment (always double-check the switches with the --help output):
-i, --increment Enable increment mode
... |
|
philsmd |
Old oclHashcat Support
|
4 |
9,866 |
02-18-2015, 07:18 PM |
|
|
Thread: Brute Force WPA2
Post: RE: Brute Force WPA2
the mask is still missing, and this
"-a ?l?u?d"
is not valid syntax
With all this information I just did give you, you should easily understand that this is what you are looking for:
Code:
--
oclha... |
|
philsmd |
Old oclHashcat Support
|
4 |
9,866 |
02-18-2015, 08:08 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
Code:
--
hashcat64.exe -m 900 -a 3 -w 3 -O -2 ?l?d hashmd4.txt ?2?2?2?2?2?2?2?2?2?2?2
--
|
|
philsmd |
hashcat
|
9 |
3,465 |
11-22-2019, 08:55 PM |
|
|
Thread: brute force with 11 length password(MD4)
Post: RE: brute force with 11 length password(MD4)
I don't agree that "H", "K", "M" and "P" are lowercase characters.
It's probably also not the best idea to mask attack such passwords (there are some exception, e.g. if you know that those password... |
|
philsmd |
hashcat
|
9 |
3,465 |
11-29-2019, 09:34 AM |
|
|
Thread: brute force resume
Post: RE: brute force resume
Sorry what are you talking about?
oclHashcat has support for restoring a cracking job, see:
https://hashcat.net/wiki/doku.php?id=oclhashcat#resume_support
BTW: cpu hashcat can also restore a task wi... |
|
philsmd |
Old oclHashcat Support
|
2 |
6,890 |
02-16-2015, 12:33 PM |
|
|
Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!
You need to download this file: https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/ethereum2john.py (Save as "ethereum2john.py" without quotes).
then run it with python... |
|
philsmd |
hashcat
|
9 |
7,903 |
01-03-2018, 11:48 AM |
|
|
Thread: brut password for etherwallet, I forgot it!
Post: RE: brut password for etherwallet, I forgot it!
No, the parameters N, r, p are only used with scrypt. Therefore it can't be -m 15600
Did you even do what I told you ? Did you run the python interpreter with the ethereum2john.py file and the json... |
|
philsmd |
hashcat
|
9 |
7,903 |
01-03-2018, 12:58 PM |
|
|
Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC
Code:
--
$ cat dict.txt
abcd
$ cat m0160.txt # masked
8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc46c:1234
$ ./hashcat-cli64.bin --quiet -m 160 m0160.txt dict.txt
8717XXX45b7cXXX66d9XXX55c6e5b9eXXXXc4... |
|
philsmd |
Old hashcat Support
|
12 |
31,848 |
07-31-2013, 06:01 PM |
|
|
Thread: Breaking SHA1-HMAC
Post: RE: Breaking SHA1-HMAC
Of course that is not good for attacking the hash, if you miss important information (the salt/key in general is known).
You could try to generate a list of salts (e.g. w/ maskprocessor and a suitabl... |
|
philsmd |
Old hashcat Support
|
12 |
31,848 |
07-31-2013, 06:58 PM |