Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: I can't use hashcat
Post: RE: I can't use hashcat
depends on your hardware make and model
What GPUs (graphic cards) do you have ? what CPUs (processors) do you have ?
For your intel CPU, you need to install the Intel OpenCL runtime for Xeon or ... |
|
philsmd |
hashcat
|
4 |
536 |
08-25-2020, 08:20 AM |
|
|
Thread: question about hccapx
Post: RE: question about hccapx
--potfile-disable
hashcat won't keep cracking the same hash/network again and again and again if it already was cracked. The hashcat.potfile will contain the "list" of cracked hashes |
|
philsmd |
hashcat
|
1 |
526 |
03-31-2020, 06:45 PM |
|
|
Thread: Guess rejection policy for mangling rules attack
Post: RE: Guess rejection policy for mangling rules atta...
no, you shouldn't bother about this. It would be way too complex and time consuming (performance drop) to check this type of "rejection". It would cost MUCH more to check for a rejection than actually... |
|
philsmd |
hashcat
|
1 |
525 |
04-27-2020, 12:00 PM |
|
|
Thread: hashmode sha1(sha1($pass).$salt) support?
Post: RE: hashmode sha1(sha1($pass).$salt) support?
This seems to be similar to:
-m 4520 = sha1($salt.sha1($pass))
-m 4521 = Redmine
-m 4522 = PunBB
but with the $salt at the end instead of at the beginning (all of the above use the salt at the s... |
|
philsmd |
hashcat
|
1 |
520 |
05-04-2020, 07:06 PM |
|
|
Thread: Hashcat failing with proper character set
Post: RE: Hashcat failing with proper character set
do not post hashes, see https://hashcat.net/forum/announcement-2.html |
|
philsmd |
hashcat
|
1 |
514 |
04-03-2020, 05:43 PM |
|
|
Thread: Rule for targetting CamelCase passwords?
Post: RE: Rule for targetting CamelCase passwords?
Code:
--
hashcat -m 0 -a 1 -w 3 -j c -k c hash.txt dict1.txt dict2.txt
--
instead of the "c" rule you could also use the toggle rule: -j T0 -k T0 |
|
philsmd |
hashcat
|
1 |
512 |
05-27-2020, 12:16 PM |
|
|
Thread: email: pass after dehashed
Post: RE: email: pass after dehashed
after you crack the hashes (it's twofold) :
https://hashcat.net/faq#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword |
|
philsmd |
hashcat
|
4 |
510 |
09-11-2020, 08:02 AM |
|
|
Thread: Sha512(pass.salt), 128char salt.
Post: RE: Sha512(pass.salt), 128char salt.
did you try -m 1710 = sha512($pass.$salt) ?
see https://hashcat.net/wiki/doku.php?id=example_hashes
there are some differences with length limits between optimized (using -O) and pure kernels (... |
|
philsmd |
hashcat
|
2 |
504 |
07-31-2020, 10:22 PM |
|
|
Thread: 1080 ti slow percent
Post: RE: 1080 ti slow percent
add this to your command:
Code:
--
-O
--
what do you mean by 30/35 % . Where do you see this ?
The output of hashcat says:
Temp is 64c
Fan is 37 %
Util is 100%
If you are talking abou... |
|
philsmd |
Hardware
|
2 |
503 |
09-09-2020, 09:32 PM |
|
|
Thread: ROMPER HASH
Post: RE: ROMPER HASH
english only
do not post hashes
see https://hashcat.net/forum/announcement-2.html |
|
philsmd |
hashcat
|
1 |
502 |
04-29-2020, 09:24 AM |
|
|
Thread: Hashcat 6 / Cuda toolkit
Post: RE: Hashcat 6 / Cuda toolkit
no, not that I'm aware of.
It's true that it contains a lot of data/documentation and even the drivers that are often not needed.
The SDK contains several example code, documentations, the drive... |
|
philsmd |
hashcat
|
1 |
493 |
06-24-2020, 10:56 AM |
|
|
Thread: Hashcat doesn't consider the added chars from rules
Post: RE: Hashcat doesn't consider the added chars from ...
use this:
Code:
--
-S
--
within your command, see: https://hashcat.net/forum/thread-8960-post-47574.html#pid47574 |
|
philsmd |
hashcat
|
2 |
488 |
07-24-2020, 05:36 PM |
|
|
Thread: MD5 mask cracking - exhausted/different result each time
Post: RE: MD5 mask cracking - exhausted/different result...
very bad. we call this false positive (or just a wrong result)..
just try with -D 1 , it will work perfectly fine.
it seems to be a driver problem, because the same code works on each and every ... |
|
philsmd |
hashcat
|
2 |
485 |
08-05-2020, 03:47 PM |
|
|
Thread: -m 2500 hccapx works on hashcat-5.1.0+1831 but not 6.0
Post: RE: -m 2500 hccapx works on hashcat-5.1.0+1831 but...
what's your command ?
do you use -m 2500 in the command line ? |
|
philsmd |
hashcat
|
1 |
482 |
06-17-2020, 10:05 PM |
|
|
Thread: Problems with bruteforce test wpa2
Post: RE: Problems with bruteforce test wpa2
1. you might need to use --potfile-disable if the file hashcat.potfile (by default; or Test-Wifi.potfile if you use --session=Test-Wifi) already contains the cracked hashes + password ("crack"), it wa... |
|
philsmd |
hashcat
|
4 |
480 |
08-26-2020, 01:15 PM |
|
|
Thread: Problems with bruteforce test wpa2
Post: RE: Problems with bruteforce test wpa2
it is very obvious:
DBCC4CEA33 is 10 characters long
while your mask:
?1?1?1?1?1?1?1?1
is only 8 characters long.
so you either need to use ?1?1?1?1?1?1?1?1?1?1
or use the increment opti... |
|
philsmd |
hashcat
|
4 |
480 |
08-26-2020, 02:48 PM |
|
|
Thread: Rules doesn't work.
Post: RE: Rules doesn't work.
I can't give any advice about the other tools, but my recommendation is that you just should learn how hashcat works and the hashcat rules etc (see wiki, https://hashcat.net/wiki/) and just focus on h... |
|
philsmd |
hashcat
|
1 |
479 |
06-19-2020, 05:23 PM |
|
|
Thread: where is the salt?
Post: RE: where is the salt?
do not post hashes: see https://hashcat.net/forum/announcement-2.html
The general rule is to just look at the source code on how the hashes are generated... if you do not have access to any code, i... |
|
philsmd |
hashcat
|
1 |
477 |
06-09-2020, 12:45 PM |
|
|
Thread: Posting a hash from malware?
Post: RE: Posting a hash from malware?
This : https://twitter.com/TalBeerySec/status/1292734995254190080 ?
vs the password "mimikatz" -m 1000 NTLM hash : https://github.com/gentilkiwi/mimikatz/blob/a2a25cc9f5cbe86cfb6baedf5d3d39aea19b5a... |
|
philsmd |
General Talk
|
2 |
477 |
08-20-2020, 11:03 PM |
|
|
Thread: hashcat found MD5 plaintext but it is not correct not sure why
Post: RE: hashcat found MD5 plaintext but it is not corr...
first of all, it's not allowed to post hashes here, see: https://hashcat.net/forum/announcement-2.html
You will get banned for this action from this forum. There is kind of a zero tolerance policy,... |
|
philsmd |
hashcat
|
2 |
474 |
08-01-2020, 09:22 AM |