Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Custom charset issue
Post: RE: Custom charset issue
1. maskprocessor doesn't support loading hashcat's charset files ( https://hashcat.net/wiki/mask_attack#hashcat_charset_files )
2. the file extension would be .hcchr and not .hccr (but this, even if i... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
4,026 |
08-22-2016, 07:58 AM |
|
|
Thread: Very Specific Cracking Method
Post: RE: Very Specific Cracking Method
one approach could be to create multiple rules (see https://hashcat.net/wiki/?id=rule_based_attack) each one of those rules prepends one single/different character (and does the other manipilation to ... |
|
philsmd |
hashcat
|
3 |
4,054 |
11-16-2017, 10:09 AM |
|
|
Thread: Very Specific Cracking Method
Post: RE: Very Specific Cracking Method
I think that would quickly result in way too many combinations/password candidates.
It of course depends on how small your wordlist is.
If the wordlist is very small you could for instance just genera... |
|
philsmd |
hashcat
|
3 |
4,054 |
11-17-2017, 01:52 PM |
|
|
Thread: Hashcat cannot find my own password (password kwown) on TrueCrypt 7.1a file volume
Post: RE: Hashcat cannot find my own password (password ...
This question even made it into the MOST frequently asked questions (that means it is very easy to find the answer to this question because there are dozens of forum posts etc discussing the same ques... |
|
philsmd |
hashcat
|
5 |
4,060 |
01-05-2018, 12:20 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
it's not allowed to post hashes.
The encryption used by the PDF algorithm uses a 128 bit key.
This key is derived by a key-derivation-function and will be generated from your password as an inpu... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-12-2018, 10:51 PM |
|
|
Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key
You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions).
Mask attack is in general not a good strategy to recover a password f... |
|
philsmd |
hashcat
|
4 |
4,061 |
02-13-2018, 12:04 PM |
|
|
Thread: Stdin and stdout simultaneously
Post: RE: Stdin and stdout simultaneously
Yes this already works.
You must be doing something wrong, because this is working perfectly fine here.
You can troubleshoot it with just an echo command, e.g:
echo test | ./hashcat64.bin --st... |
|
philsmd |
hashcat
|
3 |
4,064 |
11-17-2017, 09:01 AM |
|
|
Thread: Combine User:hash:salt with Hash:salt:passwords
Post: RE: Combine User:hash:salt with Hash:salt:password...
How to do this was explained dozens of times on the forum and it was even added in the frequently asked question (FAQ) wiki page because of users asking the same question again and again:
https://h... |
|
philsmd |
General Help
|
1 |
4,070 |
07-13-2015, 02:36 PM |
|
|
Thread: -m 11600 7z
Post: RE: -m 11600 7z
Difficult to say without having the .7z and the extracted hash (but you are right, it is not allowed to post hashes here according to the forum's rules).
I would say that it makes sense in this cas... |
|
philsmd |
hashcat
|
3 |
4,073 |
08-01-2017, 11:31 AM |
|
|
Thread: -m 11600 7z
Post: RE: -m 11600 7z
Yeah, you are right it sometimes depends on how "experimental" the beta currently is. Sometimes (actually very often) betas contain fixes for known problems/bugs and therefore at that very moment we r... |
|
philsmd |
hashcat
|
3 |
4,073 |
08-02-2017, 10:56 AM |
|
|
Thread: I lost my second password blockchain.com.
Post: RE: I lost my second password blockchain.com.
I close this thread because it's getting ridiculous.
private mail addresses and advertisement of scammy (sounding) cryptocurrency wallet recovery services. This is not a forum where you post ads like... |
|
philsmd |
hashcat
|
8 |
4,091 |
02-28-2019, 04:27 PM |
|
|
Thread: I lost my second password blockchain.com.
Post: RE: I lost my second password blockchain.com.
Well, as you should already know by registering to this forum, it is not allowed to post hashes (https://hashcat.net/forum/announcement-2.html). It's a reason to ban you. In this case it's even worse ... |
|
philsmd |
hashcat
|
8 |
4,091 |
02-23-2019, 10:51 AM |
|
|
Thread: ssha help
Post: RE: ssha help
Example hashes can be found here: https://hashcat.net/wiki/doku.php?id=example_hashes
... and yes only -m 111 = nsldaps, SSHA-1(Base64), Netscape LDAP SSHA looks similar (has the, what we call, same ... |
|
philsmd |
General Talk
|
5 |
4,092 |
01-10-2018, 02:00 PM |
|
|
Thread: Is there any pass length workaround?
Post: RE: Is there any pass length workaround?
These questions were already answered in your previous thread https://hashcat.net/forum/thread-5318.html (and you still continue to post the same things, e.g. maskprocessor + hcmask which I told you i... |
|
philsmd |
General Help
|
1 |
4,098 |
03-14-2016, 09:10 AM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
I'm pretty sure this is a known problem with how the OpenCL kernels use utf16 chars.
As far as I know, the kernel code (also for performance reasons) for utf16le encoding is very "elementary" and j... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-13-2019, 09:54 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
yep yep yep
that's how the algorithm works (and actually most of the microsoft-invented algos),
also see this perl module to understand the algo: https://github.com/hashcat/hashcat/blob/d1f473d6... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-18-2019, 12:01 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
you can try it yourself
create a clean directory with the hashcat download/binaries (e.g. from https://hashcat.net/beta or github or even release should work). make sure that the "kernels/" directo... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-21-2019, 11:08 PM |
|
|
Thread: aes128 brute-force w/mask using half sha256
Post: RE: aes128 brute-force w/mask using half sha256
Long constant strings within the mask (especially at the beginning of the mask) are always bad for the performance.
You could try to use different attack modes, like -a 6:
Code:
--
hashcat -m 1... |
|
philsmd |
hashcat
|
3 |
4,106 |
01-09-2018, 02:42 PM |
|
|
Thread: Help identifying hash type!
Post: RE: Help identifying hash type!
According to the forum rules, which you have accepted, you are not allowed to post hashes.
See https://hashcat.net/forum/announcement-2.html
Please take a week off and re-read the forum rules. They a... |
|
philsmd |
General Help
|
1 |
4,113 |
12-11-2014, 12:55 PM |
|
|
Thread: openssl AES256 with a common standardized Password-Based Key Derivation Function
Post: RE: openssl AES256 with a common standardized Pass...
are you talking about this https://github.com/hashcat/hashcat/issues/1538 ?
this has nothing todo with the "openssl" tool at all. very different algorithm. |
|
philsmd |
hashcat
|
15 |
4,136 |
01-28-2020, 02:02 PM |