Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Slow bcrypt
Post: RE: Slow bcrypt
the cost factor is encoded in the hash
The example hash for instance starts with "$2a$05$" (hashcat -m 3200 --example-hashes) and therefore has an exponent of 5 (cost factor) and therefore uses 2^... |
|
philsmd |
hashcat
|
4 |
2,604 |
04-15-2019, 12:17 PM |
|
|
Thread: Slow bcrypt
Post: RE: Slow bcrypt
you can't change the iteration count (cost settings) without making the hash uncrackable. Therefore, technically you could change it, but it won't crack for sure with wrong settings.
btw. you didn'... |
|
philsmd |
hashcat
|
4 |
2,604 |
04-15-2019, 02:15 PM |
|
|
Thread: help with hashcat.
Post: RE: help with hashcat.
try hashcat beta (https://hashcat.net/beta/) with CUDA installed |
|
philsmd |
hashcat
|
13 |
2,609 |
04-25-2020, 09:55 PM |
|
|
Thread: help with hashcat.
Post: RE: help with hashcat.
what's the output of
Code:
--
hashcat -I
--
(after you installed the CUDA sdk) |
|
philsmd |
hashcat
|
13 |
2,609 |
04-26-2020, 12:56 PM |
|
|
Thread: New architecture, different sched
Post: RE: New architecture, different sched
Very cool. Amazing stuff! Thx |
|
philsmd |
Beta Tester
|
1 |
2,610 |
06-12-2013, 11:51 AM |
|
|
Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example
Post: RE: Help explain the PBKDF2-HMAC-SHA1 hash-example
the format is:
sha1:[iteration count]:[salt in base64]:[digest in base64]
therefore the hash is:
sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY=
this can be cracked with:
Code:
--
hashcat ... |
|
philsmd |
hashcat
|
4 |
2,620 |
02-11-2019, 10:59 PM |
|
|
Thread: Help me to crack those hashes please
Post: RE: Help me to crack those hashes please
banned (1 week, use it wisely to read and understand the forum rules) and thread closed |
|
philsmd |
hashcat
|
2 |
2,628 |
04-10-2017, 02:55 PM |
|
|
Thread: Haschat cracked a password but how can I print out it?
Post: RE: Haschat cracked a password but how can I print...
It is explained for instance here: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword
... |
|
philsmd |
hashcat
|
2 |
2,634 |
02-03-2018, 03:47 PM |
|
|
Thread: downside os speeding up hashcat with VirtualBox
Post: RE: downside os speeding up hashcat with VirtualBo...
I'm pretty sure that this is caused by some kind of power-level settings. Several hardware components can be either in max. power/performance mode or be in a energy-saving mode. This could also be the... |
|
philsmd |
hashcat
|
1 |
2,635 |
05-13-2018, 06:18 PM |
|
|
Thread: Optimize this crack
Post: RE: Optimize this crack
do you mean that there is a 10-character-long (digits + lower-case letters) random string at the beginning and 1 character (out of a character set of 8 different characters) appended? otherwise this c... |
|
philsmd |
hashcat
|
3 |
2,639 |
10-04-2018, 12:01 PM |
|
|
Thread: Hahcat is using weird random combinations instead of the files on dicitonary
Post: RE: Hahcat is using weird random combinations inst...
$HEX[2474406d66307264210d40313233] means that hashcat is trying to use the string 2474406d66307264210d40313233 in hexadecimal notation (it's in hexadecimal because there are some non-printable or "esc... |
|
philsmd |
hashcat
|
3 |
2,643 |
07-26-2018, 07:37 AM |
|
|
Thread: Hahcat is using weird random combinations instead of the files on dicitonary
Post: RE: Hahcat is using weird random combinations inst...
\r, 0x0d and '\015' are all just different forms of representing the carriage return character. Therefore yes I'm sure that it's \r, and *you* also remove the same character with your tr command.
I... |
|
philsmd |
hashcat
|
3 |
2,643 |
07-26-2018, 09:40 AM |
|
|
Thread: Cracking hash
Post: RE: Cracking hash
do not post any hashes: https://hashcat.net/forum/announcement-2.html |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
2,644 |
04-06-2020, 09:13 PM |
|
|
Thread: [mp64] Output Results with Max/Exact Number of Chars of Specified Charsets
Post: RE: [mp64] Output Results with Max/Exact Number of...
I think this is similar to what we do with policygen of PACK, i.e. using hashcat mask files (.hcmask) directly with hashcat. |
|
philsmd |
hashcat
|
2 |
2,649 |
02-06-2018, 08:38 AM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
nope. but please do me a favor and do not ignore/disregard the forum rules next time (e.g. posting hashes), they can be read here: https://hashcat.net/forum/announcement-2.html
masking the hash wou... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 07:20 PM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
well, you should at least tell us the password, otherwise it's both against the forum rules and impossible for us to know how to test / verify it.
I would say that looking at the code here https://... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 04:15 PM |
|
|
Thread: How does one crack Pbkdf2 w/hashcat?
Post: RE: How does one crack Pbkdf2 w/hashcat?
I just did clone the repository and checked out the version that you linked in your first post:
Code:
--
git clone https://github.com/rchouinard/phpass
cd phpass/
git checkout 121233fb49db4d929d... |
|
philsmd |
hashcat
|
6 |
2,658 |
06-01-2019, 07:09 PM |
|
|
Thread: CISCO ASA Enable Fix
Post: RE: CISCO ASA Enable Fix
|
philsmd |
hashcat
|
5 |
2,669 |
07-18-2019, 06:56 AM |
|
|
Thread: CISCO ASA Enable Fix
Post: RE: CISCO ASA Enable Fix
can you run the example hash from https://hashcat.net/wiki/example_hashes correctly?
there is no ending : (colon) after the hash for this hash type (-m 2400) |
|
philsmd |
hashcat
|
5 |
2,669 |
07-19-2019, 02:58 AM |
|
|
Thread: Couple of questions
Post: RE: Couple of questions
no, PMKID is not specific to WPA3.
As far as I know you just capture the network traffic with https://github.com/ZerBea/hcxdumptool and convert the capture file to hashes with https://github.com/Ze... |
|
philsmd |
hashcat
|
8 |
2,671 |
02-21-2020, 08:20 AM |