Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Speed issue with WPA2
Post: RE: Speed issue with WPA2
it could also be that you are cracking multiple networks.
For instance if the status line doesn't say:
Code:
--
Recovered........: 0/1 (0.00%) Digests, 0/1 (0.00%) Salts
--
... if there isn... |
|
philsmd |
hashcat
|
5 |
3,642 |
07-06-2018, 06:31 PM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
The algorithm is also not complete. One of the important steps is missing... how does a password cracking tool know if the password is correct ? the verification code i.e. checking the decrypted byte... |
|
philsmd |
hashcat
|
19 |
3,655 |
05-10-2020, 07:34 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
this sounds very interesting
@womble, do you plan on sharing your hashcat module and opening a pull request (PR) on github ?
what is your strategy with avoiding false positive (or can we assume ... |
|
philsmd |
hashcat
|
19 |
3,655 |
05-15-2020, 08:39 AM |
|
|
Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help
oh... are you mpalmer on github ? yeah, I see that there are some still open PRs, I think atom/jsteube is busy a lot, but I will try to ping him on IRC etc. normally it doesn't take that long (I think... |
|
philsmd |
hashcat
|
19 |
3,655 |
05-15-2020, 12:59 PM |
|
|
Thread: where did hashcat get the hashtype?
Post: RE: where did hashcat get the hashtype?
No, hashcat doesn't guess the hash type.
As many "hash identification" projects show, there is no such think as 100% knowing which hash type the input is from a random set of some (hex) bytes.
It on... |
|
philsmd |
hashcat
|
3 |
3,661 |
01-24-2017, 06:09 PM |
|
|
Thread: Another newbie question
Post: RE: Another newbie question
It's always a good idea to create a new and similar volume (same settings/steps) and use this with a password (could also be similar to the one that you think was used) for testing hashcat.
The first... |
|
philsmd |
hashcat
|
3 |
3,665 |
11-24-2017, 03:30 PM |
|
|
Thread: Another newbie question
Post: RE: Another newbie question
Yes, in theory you could use also a hex editor to extract the 512 bytes. Just make sure that the final "hash file" contains the data in binary (it does not work with hexadecimals in the hash file, it ... |
|
philsmd |
hashcat
|
3 |
3,665 |
11-25-2017, 12:23 PM |
|
|
Thread: Hashcat not running on my CPU
Post: RE: Hashcat not running on my CPU
--opencl-device-types 1,2 (or short -D 1,2) to enable both CPU and GPU cracking. see --help output |
|
philsmd |
hashcat
|
3 |
3,669 |
06-09-2019, 09:20 AM |
|
|
Thread: Noob: SHA1 problem
Post: RE: Noob: SHA1 problem
First, welcome to the hashcracking world!
You should be able to find the answer to your question both within the --help output or the hashcat wiki (especially https://hashcat.net/mask_attack ).
Hint... |
|
philsmd |
hashcat
|
2 |
3,687 |
02-05-2017, 02:18 PM |
|
|
Thread: HC 3.0 generates gibberish with rules and full syntax on WPA
Post: RE: HC 3.0 generates gibberish with rules and full...
That is kind of obvious since --stdout doesn't expect any other other files besides the files needed for the attack type (e.g. -a 0 expects a dictionary or directory, -a 3 expects a mask, -a 1 expects... |
|
philsmd |
hashcat
|
2 |
3,688 |
08-11-2016, 12:47 PM |
|
|
Thread: Help with cracking krb5tgs hash
Post: RE: Help with cracking krb5tgs hash
please test with the example hash from https://hashcat.net/wiki/example_hashes and compare your hash with the example hash.
Most of the time it's just a matter of removing the file names from the "ha... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
3,692 |
01-28-2019, 10:29 AM |
|
|
Thread: TrueCrypt 7.1a Decrypt
Post: RE: TrueCrypt 7.1a Decrypt
Since you used the offset 31744 from the start, I assume that you are trying to crack a TrueCrypt boot volume (see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_... |
|
philsmd |
hashcat
|
1 |
3,693 |
12-12-2017, 10:24 AM |
|
|
Thread: custom hcmask aborting aborting 7 seconds
Post: RE: custom hcmask aborting aborting 7 seconds
Please make sure that you provide the correct path to the file "test.hcmask" otherwise it will be interpreted as a literal mask specified on the command line (not a mask file: .hcmask).
If you spec... |
|
philsmd |
hashcat
|
3 |
3,694 |
05-31-2017, 08:27 PM |
|
|
Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512
1. why are you trying to crack the hash? can't you just replace the hash with a known hash and login ? Is it important that you know the password ?
2. your rule command/syntax is completely wrong. yo... |
|
philsmd |
hashcat
|
4 |
3,707 |
02-20-2019, 10:07 AM |
|
|
Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512
1. what is your goal here? do you need to do forensic analysis or just need to get your data back and login ? I think if you are not using full-disk-encryption you could trick the system by giving it ... |
|
philsmd |
hashcat
|
4 |
3,707 |
02-20-2019, 10:52 PM |
|
|
Thread: cannot cracking sha1($pass.$salt)
Post: RE: cannot cracking sha1($pass.$salt)
It's not allowed to post hashes here, see: https://hashcat.net/forum/announcement-2.html
Banned for 1 week, thread closed. |
|
philsmd |
General Help
|
1 |
3,711 |
03-14-2016, 04:20 PM |
|
|
Thread: My Itunes hash
Post: RE: My Itunes hash
I must admit that I didn't understand at all what you mean by this x+1 and x+2, y etc... but I would recommend that you just read the documentation on how to use hashcat mask files (.hcmask):
1. http... |
|
philsmd |
hashcat
|
3 |
3,719 |
04-02-2018, 10:13 AM |
|
|
Thread: Hired Help?
Post: RE: Hired Help?
Yes, these requests are not allowed here.
Furthermore, hashcat is about offline cracking (vs online cracking that you "want").
And of course, the solution for your problem is to not even think abo... |
|
philsmd |
General Help
|
1 |
3,723 |
01-26-2015, 11:25 AM |
|
|
Thread: Cant crack simple russian password
Post: RE: Cant crack simple russian password
As you can see by looking into the charsets folder of hashcat, russian chars can be represented with different encodings (cp1251, ISO-8859-5, KOI8-R.hcchr etc).
So one problem is that all these input... |
|
philsmd |
hashcat
|
2 |
3,725 |
03-13-2017, 11:20 PM |
|
|
Thread: Performance difference Win 7 vs Win 10?
Post: RE: Performance difference Win 7 vs Win 10?
You should be more specific about what you are trying to run.
... or are you talking about just benchmarking with -b ?
If you do not just run "hashcat -b", but some other types of attack, e.g. w... |
|
philsmd |
hashcat
|
3 |
3,726 |
09-16-2017, 09:38 AM |