Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: RAR crack
Post: RE: RAR crack
There could be many reasons why your experiencing these crashes.
I would suggest that you try the -m 12500 = RAR3-hp example hash from https://hashcat.net/wiki/example_hashes.
It would be also i... |
|
philsmd |
hashcat
|
2 |
6,493 |
07-18-2017, 05:35 PM |
|
|
Thread: OpenCL problem
Post: RE: OpenCL problem
As far as I know it's not possible to pass through the GPU with a system with only 1 GPU and furthermore VM doesn't support this GPU passthrough feature (as far as I know). It's also very complex and ... |
|
philsmd |
hashcat
|
5 |
6,486 |
11-06-2018, 12:52 PM |
|
|
Thread: test case only cracking single hash
Post: RE: test case only cracking single hash
You probably need to get rid of the newline character... it should be easy to see it just add
print plain_text,
after the "for plain_text in f:" and you will notice that there is the extra new line.... |
|
philsmd |
Old oclHashcat Support
|
2 |
6,479 |
04-03-2014, 08:35 PM |
|
|
Thread: Help for rule
Post: RE: Help for rule
Code:
--
hashcat --stdout -a 3 -1 ?l?d?u "^?1 ^?1"
--
|
|
philsmd |
General Talk
|
10 |
6,459 |
07-07-2018, 08:17 PM |
|
|
Thread: Why is the Speed so slow on my GTX 970?
Post: RE: Why is the Speed so slow on my GTX 970?
Why do you think it is way too slow.
Do you know that WPA/WPA2 algorithm is meant and known to be very slow (compared to some fast algorithm like NTLM / MD5 etc). This is a property of the WPA/WPA2 a... |
|
philsmd |
Old oclHashcat Support
|
3 |
6,452 |
04-04-2015, 07:02 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
just for testing:
Code:
--
hashcat --keyspace -m 5500 -a 6 -1 ?l?u?s possibilities.txt ?1?1?1?1?1?1?1
--
Code:
--
hashcat --stdout -a 6 -o temporary_file.txt -s 2 -l 2 -1 ?l?u?s possibiliti... |
|
philsmd |
hashcat
|
12 |
6,451 |
10-27-2018, 10:44 PM |
|
|
Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow
this sounds very strange and I'm pretty sure that it doesn't behave like you think it behaves.
How would the second process even know when the "second" word from possibilities.txt begins. It has no... |
|
philsmd |
hashcat
|
12 |
6,451 |
10-27-2018, 09:12 PM |
|
|
Thread: Odd issue even after a permissions change.
Post: RE: Odd issue even after a permissions change.
If you are using a 32 bit ubuntu version you need to modify the *Example*.sh files s.t. they use the *32.bin binary and not the 64-bit one (default). |
|
philsmd |
Very old oclHashcat-plus Support
|
1 |
6,450 |
11-28-2013, 09:00 PM |
|
|
Thread: Basic hashcat mask syntax
Post: RE: Basic hashcat mask syntax
Let me explain this:
if you use the mask ?1?1?1?1?1?1?1?1 together with --increment, what hashcat really does is run this set of masks one after the other:
Code:
--
?1
?1?1
?1?1?1
?1?1?1?1
?1?1?1?1?... |
|
philsmd |
hashcat
|
4 |
6,438 |
06-02-2017, 03:21 PM |
|
|
Thread: Mask file with Custom Character sets
Post: RE: Mask file with Custom Character sets
1. https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files clearly says that the format is like this:
[?1],[?2],[?3],[?4],[mask]
It also says that the first 4 fields are optional only the ... |
|
philsmd |
Old oclHashcat Support
|
2 |
6,431 |
02-18-2015, 06:40 PM |
|
|
Thread: --show doesn't print duplicates when using --username
Post: RE: --show doesn't print duplicates when using --u...
Recently, a new feature was implemented to support exactly this.
See https://github.com/hashcat/hashcat/issues/963 and test the beta at https://hashcat.net/beta/ |
|
philsmd |
hashcat
|
2 |
6,417 |
02-02-2017, 04:12 PM |
|
|
Thread: Hashcat piping doesn't work (WPA/2)
Post: RE: Hashcat piping doesn't work (WPA/2)
First of all, hccapx is the only hash format hashcat accepts since a long time for -m 2500 = WPA/WPA2 hashes. The hccap format is no more supported with latest versions of hashcat.
Your mask: "?l... |
|
philsmd |
User Contributions
|
4 |
6,411 |
05-11-2018, 03:48 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
The 5 missing bytes will still be 256 * 256 * 256 * 256 * 256 = 256 ^ 5 = 1099511627776 combinations.
That's a quite huge keyspace, even if the hashing algortihm (keccak) is quite fast.
of course ... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 04:59 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
hashcat uses ?H for 0123456789ABCDEF
therefore you could specify the mask as -a 3 --hex-charset [someting]?H[somethingElse]?H?H02
the main problem now is that the hash mode -m 5000 only supports a... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 05:46 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
the ciphertext gets decrypted into the raw seed if you have the correct password/AES key/
see my perl code https://github.com/hashcat/hashcat/issues/1279#issuecomment-351716733
Code:
--
my $h... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-29-2018, 09:48 PM |
|
|
Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale
that's good that you mention this fact/doubt about the private key vs seed, chick3nman
I assumed that the OP (uprising_bike) is sure that s/he has (part of) the seed, not the private key instead (t... |
|
philsmd |
hashcat
|
10 |
6,402 |
06-30-2018, 07:56 AM |
|
|
Thread: Complex iTunes password
Post: RE: Complex iTunes password
Please keep in mind:
1. this has nothing to do with hashcat. If the password is completely random, long enough, wasn't leaked before and therefore doesn't appear in any word list, it could be just in... |
|
philsmd |
hashcat
|
7 |
6,395 |
09-07-2017, 08:25 AM |
|
|
Thread: When is all the Truecrypt encryption ciphers available?
Post: RE: When is all the Truecrypt encryption ciphers a...
This is already implemented with newest (beta) version, see:
- https://hashcat.net/trac/ticket/394 or https://twitter.com/hashcat/status/667401031509258241
- https://hashcat.net/trac/ticket/618 or h... |
|
philsmd |
Old oclHashcat Support
|
4 |
6,391 |
11-24-2015, 05:41 PM |
|
|
Thread: Organizing
Post: RE: Organizing
Please read here: FAQ: --show (https://is.gd/OHpUwg) |
|
philsmd |
Old oclHashcat Support
|
4 |
6,388 |
05-06-2015, 06:57 PM |
|
|
Thread: Organizing
Post: RE: Organizing
@alpes please do not give bad advice. For instance the link that I posted above says (among others):
- --show is always used after the hashes have been cracked
- You do not need – and should not s... |
|
philsmd |
Old oclHashcat Support
|
4 |
6,388 |
05-07-2015, 01:10 PM |