Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Sanity check: "Must include chars" ruleset
Post: RE: Sanity check: "Must include chars" ruleset
If you are sure that the password length is just 10 and only 4 "random" chars, you could also use this approach. First, generate a dict (yes, this is normally not advicable, but for very small random ... |
|
philsmd |
hashcat
|
1 |
2,055 |
10-26-2017, 07:28 AM |
|
|
Thread: question about hashcat speed slow?
Post: RE: question about hashcat speed slow?
Did you try to test -m 11600 with the beta version from https://hashcat.net/beta , it has several improvements for hook code (see https://github.com/hashcat/hashcat/commit/a8555fa048517bf352c0ba16745d... |
|
philsmd |
hashcat
|
7 |
2,061 |
01-24-2020, 11:58 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
no, mask attack would be MUCH, MUCH faster if you just try "random passwords". every operation involving the disk would slow it down tremendously as already explained above when we compared -a 3 with ... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:28 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
mask attack: the candidates are directly generated/used on GPU, within the GPU kernel code
attack involving dictionaries (-a 0, -a 1, -a 6, -a 7): disk I/O bottleneck AND passwords need to be "send"/... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-06-2020, 12:41 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
if you have some specific idea, you could also develop/program your own password generator (for instance a python script or whatever) and pass the candidates to hashcat like this:
Code:
--
pytho... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:33 AM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
the hashcat way of storing mask is hashcat mask files (hcmask):
https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
my.hcmask:
Code:
--
123456789,?d-,abcdABCD?d,?3-,?1?2?4?3?3?... |
|
philsmd |
General Talk
|
8 |
2,070 |
05-29-2020, 09:24 PM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
for these numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25
you could just write several different mask like this:
Code:
--
123456789,?1
1?d
0123... |
|
philsmd |
General Talk
|
8 |
2,070 |
05-30-2020, 07:30 AM |
|
|
Thread: Wordlist + Bruteforce Attack
Post: RE: Wordlist + Bruteforce Attack
just read the output of
Code:
--
hashcat --help
--
it says
Code:
--
- [ Attack Modes ] -
...
6 | Hybrid Wordlist + Mask
--
therefore it is just:
Code:
--
hashcat -a 6 -m 1372... |
|
philsmd |
hashcat
|
2 |
2,079 |
12-27-2019, 07:55 PM |
|
|
Thread: Downloaded 3.6.0 but says I’m using v4.2.1 ??
Post: RE: Downloaded 3.6.0 but says I’m using v4.2.1 ?...
why do you use old versions in the first place ?
to run a command on any *nix based system (including macos and linux), you need to run it like this:
Code:
--
./hashcat --help
--
i.e. t... |
|
philsmd |
hashcat
|
6 |
2,080 |
07-26-2019, 05:04 PM |
|
|
Thread: Downloaded 3.6.0 but says I’m using v4.2.1 ??
Post: RE: Downloaded 3.6.0 but says I’m using v4.2.1 ?...
try to use the latest beta version from https://hashcat.net/beta |
|
philsmd |
hashcat
|
6 |
2,080 |
07-26-2019, 07:35 PM |
|
|
Thread: Downloaded 3.6.0 but says I’m using v4.2.1 ??
Post: RE: Downloaded 3.6.0 but says I’m using v4.2.1 ?...
well, I must admit that I forgot that we talked about macOS executable here.
Therefore for macOS you need to either use the github code and compile it yourself or use the homebrew packages which aren... |
|
philsmd |
hashcat
|
6 |
2,080 |
07-31-2019, 11:50 AM |
|
|
Thread: maskprocessor - how to combine letters and numbers?
Post: RE: maskprocessor - how to combine letters and num...
-1 ?l?u?d -q 4 -r 5 ?1?1?1?1?1?1?1 |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
2,084 |
07-17-2019, 11:05 AM |
|
|
Thread: Hashcat64 Insufficient memory available
Post: RE: Hashcat64 Insufficient memory available
you need to specify the hash file first (as mentioned within the first lines of --help)
hashcat -m 16800 -a 0 -w 4 hash.txt dict.txt |
|
philsmd |
hashcat
|
4 |
2,085 |
07-30-2019, 07:01 PM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
I don't think the grep test is a good/valid test.
There could be any other (even non-printable) character within that line and therefore the combined (concatenated) result is different.
You coul... |
|
philsmd |
hashcat
|
10 |
2,085 |
03-26-2020, 06:31 PM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
This command:
Code:
--
xxd -p
--
... unfortunately adds newlines within the hexadecimal output if a certain line line was reached. Try it yourself
Code:
--
echo -n aaaaaaaaaaaaaaaaaaaaaa... |
|
philsmd |
hashcat
|
10 |
2,085 |
03-27-2020, 09:53 AM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
Can you try cracking your hccapx file with -m 2500 (for testing purposes) ? |
|
philsmd |
hashcat
|
10 |
2,085 |
03-27-2020, 09:56 AM |
|
|
Thread: mask processor
Post: RE: mask processor
use .hcmask file for several different masks https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
my.hcmask
Code:
--
?l?l?l?l?l?l?l?l
?l?l?l?l?l?l?l?d
?l?l?l?l?l?l?d?l
?l?l?l?... |
|
philsmd |
General Talk
|
3 |
2,104 |
04-02-2019, 01:04 PM |
|
|
Thread: A good hash ???
Post: RE: A good hash ???
We already explained this to you here:
https://hashcat.net/forum/thread-6609-post-36090.html#pid36090
axcrypt2john.py includes the file name and hashcat doesn't need that.
either use --username o... |
|
philsmd |
hashcat
|
1 |
2,126 |
08-25-2017, 08:52 PM |
|
|
Thread: SCRYPT speed trouble
Post: RE: SCRYPT speed trouble
you need to INSTALL the runtime:
https://software.intel.com/en-us/articles/opencl-drivers#cpu-section |
|
philsmd |
hashcat
|
4 |
2,128 |
10-15-2019, 11:30 AM |
|
|
Thread: how to make an attack
Post: RE: how to make an attack
probably just an escaping problem. for instance use "$-" instead on some operating system, some need \$- etc.
I would test with a rule that doesn't need escaping at all, like:
hashcat -j u ...
... |
|
philsmd |
hashcat
|
4 |
2,139 |
06-25-2019, 08:08 AM |