Search Results
|
Post |
Author |
Forum |
Replies |
Views
[desc]
|
Posted |
|
|
Thread: oclHashcat gui issue
Post: RE: oclHashcat gui issue
If you have downloaded this 3th party GUI (https://www.md5decrypter.co.uk/hashcat-gui.aspx ) from md5decrypter.co.uk you should ask for help there https://forum.md5decrypter.co.uk/forum8-general-discuss... |
|
philsmd |
Very old oclHashcat-plus Support
|
3 |
7,571 |
11-19-2013, 04:16 AM |
|
|
Thread: Ransomware
Post: RE: Ransomware
First of all, this is of course not the usual use case for hashcat.
Furthermore, Diskcryptor is probably a legit software just misused by the malware, it's not malware but can be used to encrypt file... |
|
philsmd |
hashcat
|
13 |
7,573 |
12-13-2018, 08:06 PM |
|
|
Thread: Ransomware
Post: RE: Ransomware
I had a glance at this page: https://diskcryptor.net/wiki/Volume
and the source here https://github.com/smartinm/diskcryptor
it seems that the algo for key derivation from the password is PBKDF2-H... |
|
philsmd |
hashcat
|
13 |
7,573 |
12-13-2018, 09:12 PM |
|
|
Thread: Ransomware
Post: RE: Ransomware
Well, if it wasn't really clear yet, this specific algorithm is not supported yet by hashcat since you can't really extract a hash, but need to generate the AES-XTS keys on-the-fly and verify the decr... |
|
philsmd |
hashcat
|
13 |
7,573 |
12-14-2018, 11:06 AM |
|
|
Thread: Locked out of Keepass 1.x
Post: RE: Locked out of Keepass 1.x
if you do not know how to escape special characters within your command, you should just use a hash file.
Code:
--
hashcat64.exe -m 13400 -a 3 hash_file.txt ?l?l?l?l?l?l?l
--
of course the file "h... |
|
philsmd |
hashcat
|
6 |
7,596 |
08-08-2017, 07:09 AM |
|
|
Thread: Locked out of Keepass 1.x
Post: RE: Locked out of Keepass 1.x
you are not allowed to post hashes here.
Respect the forum rules or you get banned immediately.
It also can't be that difficult to use the same format of the example hash also for your hash.
You ... |
|
philsmd |
hashcat
|
6 |
7,596 |
08-08-2017, 01:55 PM |
|
|
Thread: Location of TrueCrypt Hidden OS Header
Post: RE: Location of TrueCrypt Hidden OS Header
I'm not sure why you are even trying to "brute-force" the offset.
The instructions are very clear: if the whole disk (operating system) is encrypted i.e. the system starts with the special boot loade... |
|
philsmd |
hashcat
|
7 |
7,597 |
07-14-2017, 08:11 PM |
|
|
Thread: Crash on every exit
Post: RE: Crash on every exit
Hey Kuci,
did you try also w/ catalyst 13.1 (https://support.amd.com/us/gpudownload/windows/previous/13/Pages/radeon_linux.aspx?os=Linux%20x86&rev=13.1 ) as suggested in GPU Driver and SDK Requirement... |
|
philsmd |
Very old oclHashcat-lite Support
|
2 |
7,695 |
06-01-2013, 02:36 PM |
|
|
Thread: 10 digit mask increments
Post: RE: 10 digit mask increments
You may be able to understand how this mask-based word generation works by looking at either the output of cpu hashcat --stdout OR maskprocessor.
It's easier to understand it (in my opinion) by see... |
|
philsmd |
Old oclHashcat Support
|
3 |
7,695 |
02-03-2014, 11:33 AM |
|
|
Thread: VeraCrypt dictionary attack
Post: RE: VeraCrypt dictionary attack
Most important question: how did you generate the binary data file needed for hashcat, did you follow this guide: https://hashcat.net/faq#how_do_i_extract_the_hashes_from_truecrypt_volumes ? |
|
philsmd |
hashcat
|
6 |
7,719 |
05-27-2017, 07:52 PM |
|
|
Thread: VeraCrypt dictionary attack
Post: RE: VeraCrypt dictionary attack
Well, if you are 100% sure that the extracted data is what hashcat expects, we might need to find the culprit somewhere else. For instance, you didn't tell us how long these password candidates are...... |
|
philsmd |
hashcat
|
6 |
7,719 |
05-27-2017, 09:16 PM |
|
|
Thread: VeraCrypt dictionary attack
Post: RE: VeraCrypt dictionary attack
Well, that might explain it ("its length is of about 40 characters")... see https://hashcat.net/faq#what_is_the_maximum_supported_password_length
so max 31 for -a 0 (40 is already too long).
But you... |
|
philsmd |
hashcat
|
6 |
7,719 |
05-27-2017, 10:46 PM |
|
|
Thread: --show doesnt work
Post: RE: --show doesnt work
you also need to specify the hash type. How else should cudaHashcat/oclHashcat know what type of hashes it should load?
(btw: all this info is mentioned on the wiki page that epixoip linked) |
|
philsmd |
Old oclHashcat Support
|
6 |
7,734 |
03-23-2016, 02:59 PM |
|
|
Thread: multi hccap crack
Post: RE: multi hccap crack
The multi-hccap support is explained here: https://hashcat.net/wiki/doku.php?id=hccap
Note: for performance reasons you cannot mix wpa2 and wpa (also see https://hashcat.net/trac/ticket/222#comment:4 ... |
|
philsmd |
Old oclHashcat Support
|
1 |
7,754 |
01-20-2014, 08:34 PM |
|
|
Thread: hashcat problem
Post: RE: hashcat problem
You should never use --show while cracking (and while specifying a wordlist, mask etc).
Please read the wiki: FAQ: --show (https://is.gd/HiV9cw) |
|
philsmd |
Old hashcat Support
|
4 |
7,772 |
05-29-2015, 09:26 PM |
|
|
Thread: $HEX[...]
Post: RE: $HEX[...]
Yes, encoding matters. Try this:
Code:
--
echo -en 'EFE\xc7INAR' | md5sum
f54198dc47cf5cd61202b8675e118811 -
--
or this:
Code:
--
echo -n 'EFEÇINAR' | iconv -t iso-8859-1 | md5sum
f... |
|
philsmd |
Old oclHashcat Support
|
3 |
7,779 |
06-14-2014, 11:18 AM |
|
|
Thread: cap2hccapx and odd ESSID
Post: RE: cap2hccapx and odd ESSID
Yeah, feel free to contribute with such a pull request.
I would say that using the $HEX[] format would be a good solution since it is already used a lot for the different hashcat tools.
So the input... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
6 |
7,821 |
03-17-2017, 09:53 AM |
|
|
Thread: Building password list
Post: RE: Building password list
just answered above:
Code:
--
mp64 -q 2 ?l?l?l?l?l?l?l?l
--
|
|
philsmd |
hashcat
|
21 |
7,827 |
09-04-2019, 03:39 PM |
|
|
Thread: Building password list
Post: RE: Building password list
no, read the help of maskprocessor (https://github.com/hashcat/maskprocessor)
Code:
--
-q, --seq-max=NUM Maximum number of multiple sequential characters
--
Did you even test it ? Do ... |
|
philsmd |
hashcat
|
21 |
7,827 |
09-05-2019, 12:38 PM |
|
|
Thread: Building password list
Post: RE: Building password list
I really hate it if we are talking about 2+ very different problems that are very unrelated (except that you can use mask in both cases).
1. question about 2 adjacent identical characters
2. a simpl... |
|
philsmd |
hashcat
|
21 |
7,827 |
09-04-2019, 01:20 PM |