Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
I've modified your latest post, because you shouldn't post private/sensitive info here (the forum rules say do not post hashes in public).
If the the wallet has double_encryption enabled you probab... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 10:10 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
as explained here: https://hashcat.net/forum/thread-8288-post-44420.html#pid44420
the only way to obtain the second hash for -m 18800 (you of course need to crack the second hash for the second passw... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 10:43 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
crack the hashes you obtain with with extract-blockchain-second-hash.py -m 18800 = Blockchain, My Wallet, Second Password (SHA256)
if you have removed the double encryption (BOTH encryptions), you ... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-16-2019, 11:12 PM |
|
|
Thread: Blockchain hash
Post: RE: Blockchain hash
so as far as I understood, the question (also in regards to your PM) was how to obtain the intermediate results between the two decryption step. Well, it's just using PBKDF2-HMAC-SHA1 (32 byte output)... |
|
philsmd |
hashcat
|
10 |
4,442 |
04-17-2019, 08:46 AM |
|
|
Thread: How to generate/try random keys for 3des?
Post: RE: How to generate/try random keys for 3des?
You should be more specific about what you know about the keys/passwords.
If the keys are completely random and k1, k2 and k3 could all be different, then the keyspace is very large (way too large to... |
|
philsmd |
hashcat
|
5 |
4,445 |
08-14-2017, 03:05 PM |
|
|
Thread: How to generate/try random keys for 3des?
Post: RE: How to generate/try random keys for 3des?
I see no reason to use rand () here. That would only make sense if you know the seed (as explained in my previous post). Otherwise it would just slow everything down by a lot.
Furthermore, there is no... |
|
philsmd |
hashcat
|
5 |
4,445 |
08-14-2017, 04:44 PM |
|
|
Thread: CPU v GPU configuration
Post: RE: CPU v GPU configuration
hashcat currently supports these attack modes:
-a 0 dict.txt
-a 1 dict1.txt dict2.txt
-a 3 ?a?a?a?a?a
-a 6 dict.txt ?a?a?a?a?a
-a 7 ?a?a?a?a?a dict.txt
you did use NONE (including the mask and... |
|
philsmd |
hashcat
|
5 |
4,468 |
08-16-2018, 08:26 AM |
|
|
Thread: FIFO help
Post: RE: FIFO help
If you are using just a few rules (or possibly even just 1), you can use -j/-k together with -a1 for each and every rule:
Code:
--
hashcat -m 1000 -a 1 -w 4 -j "$1 $2 $3" hash.txt dict1.txt dict2.tx... |
|
philsmd |
hashcat
|
3 |
4,472 |
05-25-2017, 11:01 AM |
|
|
Thread: FIFO help
Post: RE: FIFO help
As said, the first approach (with -j/-k) should be used if you plan to use only very few rules: i.e. you can start hashcat a couple of times (one after the other in a sequence, or loop if you prefer) ... |
|
philsmd |
hashcat
|
3 |
4,472 |
05-26-2017, 07:44 AM |
|
|
Thread: keyspace vs speed and time estimated
Post: RE: keyspace vs speed and time estimated
There are 2 different definitions of "keyspace" here:
1. the first of them is the "keyspace" for a sequence of 8 upper case characters, i.e. 26 ^ 8 = 208827064576 (note: you can see this also within t... |
|
philsmd |
Old oclHashcat Support
|
2 |
4,497 |
03-15-2016, 05:47 PM |
|
|
Thread: Recovery not even starting
Post: RE: Recovery not even starting
First of all, according to the forum rules you are not allowed to post hashes see https://hashcat.net/forum/announcement-2.html
Second, the hash that you use corresponds to a password with 4 characte... |
|
philsmd |
Old oclHashcat Support
|
2 |
4,501 |
03-20-2015, 11:05 PM |
|
|
Thread: line break problem
Post: RE: line break problem
oclHashcat output is always in the format:
hash[:salt]:plain
you just need to use a modern text editor (like notepad++ on windows) which is able to show you the newlines |
|
philsmd |
General Help
|
1 |
4,502 |
03-05-2014, 01:02 AM |
|
|
Thread: Mac OSX Mojave .plist format conversion
Post: RE: Mac OSX Mojave .plist format conversion
never heard about this "AuthenticationAuthority" format, hashcat officially only supports this: https://hashcat.net/forum/thread-8368-post-44680.html#pid44680 and the itunes backups plist files.
We... |
|
philsmd |
hashcat
|
9 |
4,502 |
06-03-2019, 09:45 AM |
|
|
Thread: Mac OSX Mojave .plist format conversion
Post: RE: Mac OSX Mojave .plist format conversion
if I understood this correctly you can access the file when mounting the file system with a different operating system ?!
I think we can't do anything about that. You can't just use a totally diffe... |
|
philsmd |
hashcat
|
9 |
4,502 |
06-14-2019, 06:53 PM |
|
|
Thread: cannot launch mask attack with hashtopus
Post: RE: cannot launch mask attack with hashtopus
This is the wrong forum for these questions.
This is the hashcat/oclHashcat forum.
The hashtopus forum is https://hashtopus.org/Site/forum/ (also see https://hashcat.net/forum/thread-5251.html) |
|
philsmd |
User Contributions
|
1 |
4,503 |
03-16-2016, 10:18 PM |
|
|
Thread: Rule-based Attack: Substitution of single chars with strings
Post: RE: Rule-based Attack: Substitution of single char...
As far as I know, if you want to stick with rules, you would probably need at least 2 different types of rules.
One idea is to purge all "!" characters with the purge rule and insert the multi-byte s... |
|
philsmd |
hashcat
|
4 |
4,508 |
05-12-2017, 09:29 AM |
|
|
Thread: Rule-based Attack: Substitution of single chars with strings
Post: RE: Rule-based Attack: Substitution of single char...
If you want to use some static string like "#&33;" within a mask, you just need to put it there for instance like this (file mask_file.hcmask):
Code:
--
?l?u?d,?1?1?1?1?1#&33;
?l?u?d,?1?1?1?1#&33... |
|
philsmd |
hashcat
|
4 |
4,508 |
05-13-2017, 09:58 AM |
|
|
Thread: Password Manager .rfp file analysis
Post: Password Manager .rfp file analysis
Some days ago I was privately (via PMs) contacted by a hashcat user and they asked if I knew if hashcat could deal with database files from RoboForm (a seemingly well-known and often recommended passw... |
|
philsmd |
User Contributions
|
1 |
4,515 |
06-06-2018, 06:47 AM |
|
|
Thread: Problems with the encodings of dictionaries ...
Post: RE: Problems with the encodings of dictionaries .....
You are not allowed to post hashes here, you get banned for breaking the forum rules.
For what regards the problem with encoding: you need to use the correct encoding, in this case it is ISO-8859-9... |
|
philsmd |
hashcat
|
5 |
4,523 |
11-12-2017, 02:22 PM |
|
|
Thread: Problems with the encodings of dictionaries ...
Post: RE: Problems with the encodings of dictionaries .....
russian passwords could also be encoded with CP1251 or KOI8-R etc.
Pro tip: there are some charsets shipped with hashcat (see for instance the charsets/standard/Russian folder under your extracted ha... |
|
philsmd |
hashcat
|
5 |
4,523 |
11-16-2017, 09:34 PM |