Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: mask order unknown?
Post: RE: mask order unknown?
use policygen from PACK (https://thesprawl.org/projects/pack/), i.e. the use of .hcmask files is needed (and PACK can generate them for you) |
|
philsmd |
hashcat
|
2 |
3,106 |
05-29-2017, 08:59 PM |
|
|
Thread: precompute bcrypt hashes
Post: RE: precompute bcrypt hashes
so you are trying to build some kind of a rainbow table in 2k20 ?
the problem that you might be also completely ignoring is that I/O (disk etc) is very slow (https://en.wikipedia.org/wiki/File:Comp... |
|
philsmd |
hashcat
|
13 |
3,106 |
01-31-2020, 11:46 PM |
|
|
Thread: precompute bcrypt hashes
Post: RE: precompute bcrypt hashes
if you really think that the time (printing etc) is no problem, you could just easily add a printf () statement in the comp () kernel to print the computed digest and call it a day. no need to do any ... |
|
philsmd |
hashcat
|
13 |
3,106 |
02-01-2020, 08:19 AM |
|
|
Thread: precompute bcrypt hashes
Post: RE: precompute bcrypt hashes
as said, for the basic testing and checking the (hexadecimal) digest, you could just add a printf ():
Code:
--
diff --git a/OpenCL/m03200-pure.cl b/OpenCL/m03200-pure.cl
index d4eaac06..bd0afdc2 ... |
|
philsmd |
hashcat
|
13 |
3,106 |
02-02-2020, 03:49 PM |
|
|
Thread: problem with hashcat windows restart or switch off
Post: RE: problem with hashcat windows restart or switch...
well, it would make sense starting to test with only 1 GPU and see if it works, don't you think that's some good strategy for testing issues? |
|
philsmd |
hashcat
|
12 |
3,112 |
11-26-2019, 08:31 AM |
|
|
Thread: Replace rule - but not all at once
Post: RE: Replace rule - but not all at once
see the rules page on the wiki: https://hashcat.net/wiki/doku.php?id=rule_based_attack#using_p_nth_instance_of_a_character_with_positional_rules |
|
philsmd |
hashcat
|
4 |
3,115 |
08-28-2018, 05:03 PM |
|
|
Thread: Replace rule - but not all at once
Post: RE: Replace rule - but not all at once
multiple substitutions should be no problem because currently a single rule could consist of up to 31 rule functions: https://hashcat.net/wiki/doku.php?id=rule_based_attack#limitations
The only pro... |
|
philsmd |
hashcat
|
4 |
3,115 |
08-29-2018, 09:55 AM |
|
|
Thread: Ryzen 5 2400G: Difference between Linux and Windows wrt -m 1800: Factor 3.5
Post: RE: Difference between Linux and Windows wrt -m 18...
the operating system ideally makes no difference (except if you did some specific tuning with one benchmark and didn't with another). I would suggest to test at least the same versions to make a 1:1 c... |
|
philsmd |
hashcat
|
8 |
3,117 |
05-31-2019, 02:40 PM |
|
|
Thread: Cracking multiple WPA2 hashes?
Post: RE: Cracking multiple WPA2 hashes?
see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_crack_multiple_wpa_handshakes_at_once
and
https://hashcat.net/wiki/doku.php?id=hccapx |
|
philsmd |
hashcat
|
2 |
3,118 |
10-19-2018, 06:34 PM |
|
|
Thread: How to encrypt password with wpa2?
Post: RE: How to encrypt password with wpa2?
you could use tools/test.pl for this
Code:
--
echo hashcatrocks | perl tools/test.pl passthrough 2500 | base64 -d > my.hccapx
--
btw: tools/test.pl is within the hashcat folder (source code)... |
|
philsmd |
hashcat
|
9 |
3,132 |
08-14-2019, 09:43 AM |
|
|
Thread: processor couldn't load
Post: RE: processor couldn't load
please see the output of hashcat64 --help
For instance for CPU and GPU you could use --opencl-device-types 1,2 (or short -D 1,2)
BTW: your command also contains an error "-1 -1" makes no sense, one... |
|
philsmd |
General Talk
|
2 |
3,137 |
06-02-2017, 10:18 PM |
|
|
Thread: Toggle question / Emulate shift
Post: RE: Toggle question / Emulate shift
see https://hashcat.net/wiki/doku.php?id=rule_based_attack#implemented_specific_functions for ascii increment/decrement and shift left/right rule functions. |
|
philsmd |
hashcat
|
4 |
3,137 |
07-02-2018, 08:21 AM |
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
not possible. math must be understood and respected. things that are infeasible, are and will remain infeasible (at least for our lifetime).
as we told you already hundreds of times (at least that ... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-05-2019, 05:03 PM |
|
|
Thread: length & Mask problem with PMK (-m 2501/16801)
Post: RE: length & Mask
yeah, -a 0 (dictionary attack) makes most sense with -m 2501 and -m 16801
the general approach is to use wlangenpmk (or wlangenpmkocl for OpenCL support) from https://github.com/ZerBea/hcxkeys
... |
|
philsmd |
General Talk
|
4 |
3,139 |
05-06-2019, 09:03 AM |
|
|
Thread: Syntax Help
Post: RE: Syntax Help
You do not need the wallet.dat file directly for cracking (after you already extracted the information with bitcoin2john.py), you only need the file hash.txt for cracking (it already contains the "has... |
|
philsmd |
General Talk
|
3 |
3,165 |
12-02-2017, 09:01 AM |
|
|
Thread: Line-length Exception (mode)
Post: RE: Line-length Exception (mode)
-m 7000 = Fortigate (FortiOS) was never implemented in oclHashcat/cudaHashcat and therefore is currently also not available in hashcat 3.10 (since hashcat 3.00 basically improved oclHashcat to support... |
|
philsmd |
hashcat
|
1 |
3,177 |
08-19-2016, 06:56 PM |
|
|
Thread: IIS http digest
Post: RE: IIS http digest
I think the MD5-sess "algorithm" could be a problem here, afaik we currently only support the "normal" "MD5" one.
see the differences here:
https://en.wikipedia.org/wiki/Digest_access_authenticatio... |
|
philsmd |
hashcat
|
5 |
3,180 |
11-19-2018, 07:07 PM |
|
|
Thread: IIS http digest
Post: RE: IIS http digest
yeah, there are basically 2 different algorithms, namely "MD5" vs "MD5-sess", and currently only MD5 is supported by hashcat.
The difference is basically that MD5-sess includes the nonce and client... |
|
philsmd |
hashcat
|
5 |
3,180 |
11-20-2018, 08:18 PM |
|
|
Thread: Extract all passwords from potfile
Post: RE: Extract all passwords from potfile
that's incorrect.
--show only considers the hashes matching the current hash type and hash list (hash.txt):
Code:
--
hashcat -m 0 --show --outfile-format 2 hash.txt
--
|
|
philsmd |
hashcat
|
4 |
3,187 |
02-16-2019, 03:34 PM |
|
|
Thread: Issues in cracking WPA2 with wordlist+mask
Post: RE: Issues in cracking WPA2 with wordlist+mask
The minimum password length for WPA/WPA2 is 8 bytes/characters.
Hashcat will immediately reject (see the Rejected.........: line within your status) all passwords which do not adhere to this limita... |
|
philsmd |
hashcat
|
1 |
3,201 |
09-04-2017, 10:45 AM |