Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Save/Restore "unnamed" Session
Post: RE: Save/Restore "unnamed" Session
jodler303 Wrote: (08-11-2016, 06:50 PM)
--
and by multiplying the percentage with keyspace you can calculate the offset for --skip
--
Sorry, but this statement is bullshit. There is a specific lin... |
|
philsmd |
hashcat
|
12 |
24,560 |
08-12-2016, 08:42 AM |
|
|
Thread: Save/Restore "unnamed" Session
Post: RE: Save/Restore "unnamed" Session
jodler303 Wrote: (08-13-2016, 05:07 PM)
--
So what you will do (or maybe just me ;-)) is, taking the percentage from the last mask hashcat was working on, letting it finish off that mask the way i h... |
|
philsmd |
hashcat
|
12 |
24,560 |
08-13-2016, 05:57 PM |
|
|
Thread: Save/Restore "unnamed" Session
Post: RE: Save/Restore "unnamed" Session
I also think an error or at least a warning should be displayed whenever someone tries to use --skip with a mask file.
Since warnings are often ignored by the users, I think hashcat should show an er... |
|
philsmd |
hashcat
|
12 |
24,560 |
08-13-2016, 10:00 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
by the way, it doesn't seem that ethereum uses "just sha3", see https://github.com/ethereum/cpp-ethereum/blob/develop/libdevcrypto/SecretStore.cpp#L378-L418
It seems that the SHA3 () step is just p... |
|
philsmd |
hashcat
|
26 |
24,603 |
03-19-2017, 02:30 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
@dindolo1979 Attention: I would be very careful with this small set of information you provided/got here.
As far as I understood the algorithm is much more simple/straight forward and doesn't need an... |
|
philsmd |
hashcat
|
26 |
24,603 |
04-07-2017, 02:03 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, in this very specific situation it might be best to have a fast (standalone) password generator (a c file, perl script etc which only generates passwords according to your "rules").
According t... |
|
philsmd |
hashcat
|
26 |
24,603 |
04-08-2017, 09:32 AM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
@dindolo1979
This post is just to let you know that both ethereum algorithms are now available in the newest beta version of hashcat (beta 3.5.0+168 or newer, https://hashcat.net/beta/).
See htt... |
|
philsmd |
hashcat
|
26 |
24,603 |
06-05-2017, 03:34 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
update for ethereum modes supported by hashcat:
we recently also added -m 16300 = Ethereum Pre-Sale Wallet, PBKDF2-HMAC-SHA256 (https://github.com/hashcat/hashcat/pull/1476) which is currently suppor... |
|
philsmd |
hashcat
|
26 |
24,603 |
12-20-2017, 02:20 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Hmm, you should be a little bit more specific about which "perl script" your are speaking about.
I probably posted too many perl scripts on the hashcat forum already so it's not easy enough for me to... |
|
philsmd |
hashcat
|
26 |
24,603 |
12-17-2017, 11:27 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
You basically already answered your own question by explaining the algorithm details and linking to the algorithm description.
Furthermore, this question was already recently addressed within this fo... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-10-2018, 07:39 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
The algorithm doesn't allow to recover the whole seed (if it was really generated in a cryptographically secure random way) by just knowing some bytes (let's say 80) of the encrypted seed (furthermore... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:24 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 02:49 PM |
|
|
Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB
Now, thinking about the padding attack... I think an alternative could work without revealing the whole encseed.
The thing is that the pre-sale algorithm uses padding (as already mentioned a couple... |
|
philsmd |
hashcat
|
26 |
24,603 |
02-11-2018, 04:01 PM |
|
|
Thread: any guide installing cuda/nvidia on linux?
Post: RE: any guide installing cuda/nvidia on linux?
The answer is just to *not* install anything "cuda"-related at all and do not install anything from you packet manager (because it will be outdated and probably not working).
The only thing you need ... |
|
philsmd |
General Help
|
8 |
24,644 |
03-08-2016, 10:17 AM |
|
|
Thread: any guide installing cuda/nvidia on linux?
Post: RE: any guide installing cuda/nvidia on linux?
it should be very clear what I meant, but I will try to rephrase it: the forum user @pay said he did install the debian package cuda-repo-ubuntu1404_7.5-18_amd64.deb, nvidia-kernel-dkms and nvidia-cud... |
|
philsmd |
General Help
|
8 |
24,644 |
03-08-2016, 07:14 PM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Where did you get the information from that it needs to have a "Veracrypt" string in it?
This is not true as far as I can tell.
You are basically searching for something (the "Veracrypt" thing) that s... |
|
philsmd |
hashcat
|
20 |
24,726 |
01-26-2017, 09:34 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Looks good. Good luck with the password recovery. |
|
philsmd |
hashcat
|
20 |
24,726 |
01-27-2017, 10:33 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Why do you use mask processor? hashcat has inbuilt support for mask attack (--attack-mode 3 or short -a 3).
Your disk and transfer speed to the GPUs is probably the bottleneck (if you do not use -a 3 ... |
|
philsmd |
hashcat
|
20 |
24,726 |
01-27-2017, 10:55 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Well, that's very different, both the size of the binary data and they don't even use an offset (the skip parameter).
Of course if you skip 31744 from the start you won't find the "Truecrypt΅ header ... |
|
philsmd |
hashcat
|
20 |
24,726 |
01-27-2017, 09:36 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
atom was not speaking about the output length but about the details of the algorithm, i.e. whenever you have to apply the same hashing function thousand or even millions of times, the speed will be dr... |
|
philsmd |
hashcat
|
20 |
24,726 |
01-28-2017, 01:50 PM |