Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: HMAC-SHA1 with binary Key
Post: RE: HMAC-SHA1 with binary Key
pro tip with hashcat 3.6+ or newer you could just use the --encoding-to command line option (if the word list is not already using the correct encoding):
Code:
--
$ cat hash.txt
30263e435f8ce1b... |
|
philsmd |
hashcat
|
3 |
4,169 |
10-16-2017, 07:33 AM |
|
|
Thread: known mask structure
Post: RE: known mask structure
Read here: https://hashcat.net/wiki/doku.php?id=mask_attack
You could easily do this w/ a combination of custom charsets ( https://hashcat.net/wiki/doku.php?id=mask_attack#custom_charsets ), some masks ... |
|
philsmd |
Old oclHashcat Support
|
1 |
4,168 |
07-01-2014, 04:31 PM |
|
|
Thread: Polish letters - office
Post: RE: Polish letters - office
Maybe the confusion here is just that you are thinking that this string consists of 3 bytes, while it (probably) is at least 6 bytes long:
See here (hexdump):
Code:
--
echo -n ąąą | xxd -g 1
... |
|
philsmd |
hashcat
|
4 |
4,168 |
02-07-2017, 02:02 PM |
|
|
Thread: Polish letters - office
Post: RE: Polish letters - office
After trying your example, I came to the conclusion that you might have hit exactly one limitation of hashcat, i.e. that it doesn't perform a "perfectly correct" utf16 conversion of the password candi... |
|
philsmd |
hashcat
|
4 |
4,168 |
02-08-2017, 08:50 PM |
|
|
Thread: mask attack with a max occurrence
Post: RE: mask attack with a max occurrence
maskprocessor (https://github.com/hashcat/maskprocessor) has 2 options:
-q, --seq-max=NUM Maximum number of multiple sequential characters
-r, --occurrence-max=NUM Maximum number of o... |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
4,163 |
08-03-2017, 04:59 PM |
|
|
Thread: Insufficient memory
Post: RE: Insufficient memory
what is your command ?
make sure that you do not confuse the hash file with the dictionary file.
If you specify the command line parameters in the wrong way, errors like the one you see could ha... |
|
philsmd |
hashcat
|
13 |
4,152 |
10-15-2019, 07:38 AM |
|
|
Thread: Insufficient memory
Post: RE: Insufficient memory
use -a 0 instead
the wrong one you used is not for dictionary attack (see --help output) |
|
philsmd |
hashcat
|
13 |
4,152 |
10-16-2019, 10:35 AM |
|
|
Thread: Insufficient memory
Post: RE: Insufficient memory
what's your command and what is the content of the files ?
how large are the files and what do they contain.
Read more about mask attack here: https://hashcat.net/wiki/?id=mask_attack |
|
philsmd |
hashcat
|
13 |
4,152 |
10-19-2019, 09:08 AM |
|
|
Thread: How to restore haschat after reboot and please help with GETH wallet decrypted
Post: RE: How to restore haschat after reboot and please...
you can restore a session by moving into the correct directory and running just this command:
Code:
--
hashcat --restore
--
you do not need (and are not allowed) to add many further arguments ... |
|
philsmd |
hashcat
|
5 |
4,143 |
03-20-2018, 01:38 PM |
|
|
Thread: openssl AES256 with a common standardized Password-Based Key Derivation Function
Post: RE: openssl AES256 with a common standardized Pass...
are you talking about this https://github.com/hashcat/hashcat/issues/1538 ?
this has nothing todo with the "openssl" tool at all. very different algorithm. |
|
philsmd |
hashcat
|
15 |
4,136 |
01-28-2020, 02:02 PM |
|
|
Thread: openssl AES256 with a common standardized Password-Based Key Derivation Function
Post: RE: openssl AES256 with a common standardized Pass...
I don't know about the details, but also the source code you posted says "Multibit Classic" (as the title of the github issue), so maybe there is a lot of confusion because users try to hijack github ... |
|
philsmd |
hashcat
|
15 |
4,136 |
01-29-2020, 10:26 AM |
|
|
Thread: openssl AES256 with a common standardized Password-Based Key Derivation Function
Post: RE: openssl AES256 with a common standardized Pass...
so it seems the only check is that the 32 decrypted bytes are base58 chars and the first needs to start with either L, K, 5 or Q.
I think that is approximately a chance of (58^32) / (256^32) .... it'... |
|
philsmd |
hashcat
|
15 |
4,136 |
01-29-2020, 03:12 PM |
|
|
Thread: openssl AES256 with a common standardized Password-Based Key Derivation Function
Post: RE: openssl AES256 with a common standardized Pass...
I don't know what we can/should do here, but maybe somebody can do some more research and update the github issue etc...
For instance it seems that the wiki says it uses base58check:
https://githu... |
|
philsmd |
hashcat
|
15 |
4,136 |
01-29-2020, 07:52 PM |
|
|
Thread: openssl AES256 with a common standardized Password-Based Key Derivation Function
Post: RE: openssl AES256 with a common standardized Pass...
as mentioned here: https://github.com/hashcat/hashcat/pull/2306 , you need to use multibit2john.py to convert the file to a hash... but you also need to remove the file name from the beginning... the ... |
|
philsmd |
hashcat
|
15 |
4,136 |
02-08-2020, 01:35 PM |
|
|
Thread: Help identifying hash type!
Post: RE: Help identifying hash type!
According to the forum rules, which you have accepted, you are not allowed to post hashes.
See https://hashcat.net/forum/announcement-2.html
Please take a week off and re-read the forum rules. They a... |
|
philsmd |
General Help
|
1 |
4,113 |
12-11-2014, 12:55 PM |
|
|
Thread: aes128 brute-force w/mask using half sha256
Post: RE: aes128 brute-force w/mask using half sha256
Long constant strings within the mask (especially at the beginning of the mask) are always bad for the performance.
You could try to use different attack modes, like -a 6:
Code:
--
hashcat -m 1... |
|
philsmd |
hashcat
|
3 |
4,106 |
01-09-2018, 02:42 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
I'm pretty sure this is a known problem with how the OpenCL kernels use utf16 chars.
As far as I know, the kernel code (also for performance reasons) for utf16le encoding is very "elementary" and j... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-13-2019, 09:54 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
yep yep yep
that's how the algorithm works (and actually most of the microsoft-invented algos),
also see this perl module to understand the algo: https://github.com/hashcat/hashcat/blob/d1f473d6... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-18-2019, 12:01 PM |
|
|
Thread: Office international character problem
Post: RE: Office international character problem
you can try it yourself
create a clean directory with the hashcat download/binaries (e.g. from https://hashcat.net/beta or github or even release should work). make sure that the "kernels/" directo... |
|
philsmd |
hashcat
|
10 |
4,102 |
07-21-2019, 11:08 PM |
|
|
Thread: Is there any pass length workaround?
Post: RE: Is there any pass length workaround?
These questions were already answered in your previous thread https://hashcat.net/forum/thread-5318.html (and you still continue to post the same things, e.g. maskprocessor + hcmask which I told you i... |
|
philsmd |
General Help
|
1 |
4,098 |
03-14-2016, 09:10 AM |