Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: nVidia 1660 familly hashrates
Post: RE: nVidia 1660 familly hashrates
you need to use -D 1,2 (capital D for --opencl-device-types) to enable both CPU and GPU (-d x is something else, it just selects already whitelisted/enabled devices).
you have pocl installed and th... |
|
philsmd |
Hardware
|
5 |
2,198 |
02-11-2020, 07:17 PM |
|
|
Thread: md5(md5($pass).$salt)
Post: RE: md5(md5($pass).$salt)
This is the algo used by vbulletin, see the --help output:
hashcat supports:
-m 2611 = vBulletin < v3.8.5
and
-m 2711 = vBulletin >= v3.8.5
the difference is mainly the supported salt length (s... |
|
philsmd |
hashcat
|
1 |
2,176 |
08-20-2018, 09:48 AM |
|
|
Thread: I want to brute force incrementally with two digits appended
Post: RE: I want to brute force incrementally with two d...
You can use a .hcmask file for this (https://hashcat.net/wiki/mask_attack#hashcat_mask_files):
Code:
--
hashcat -m 0 -a 3 hash_file.txt mask_file.hcmask
--
content of the file "mask_file.hcmas... |
|
philsmd |
hashcat
|
1 |
2,173 |
04-04-2017, 06:55 PM |
|
|
Thread: Can anyone help me with a NTLM? I didn't solve it for three days.
Post: RE: Can anyone help me with a NTLM? I didn't solve...
It seems that you didn't stick to the forum rules: https://hashcat.net/forum/announcement-2.html
Please review them again during your 1 week ban. The reason for your ban is: posting hashes
Hope yo... |
|
philsmd |
Hardware
|
1 |
2,172 |
03-20-2018, 08:17 AM |
|
|
Thread: hashcat mask attack
Post: RE: hashcat mask attack
12 character brute-force is very large ! the knowledge about the 8 uppercase A-F chars doesn't change that much. The number is still quite huge.
anyway, the answer is to use hashcat mask files toge... |
|
philsmd |
hashcat
|
3 |
2,171 |
05-26-2019, 09:18 AM |
|
|
Thread: ASP.NET Identity Framework script
Post: RE: ASP.NET Identity Framework script
Thanks !
this is actually quite a strange way to encode the hashes, but it's not the first time we see some format like this ;)
In theory we could add a "module" (that just does the parsing and ... |
|
philsmd |
User Contributions
|
1 |
2,171 |
07-26-2019, 04:37 AM |
|
|
Thread: Possible to use CUDA and OpenCL side-by-side?
Post: RE: Possible to use CUDA and OpenCL side-by-side?
oh, I see. yeah, I meant any backend supported (OpenCL or CUDA with newest beta version), not just the "OpenCL runtime", but any runtime. That's cleary my fault in writing that incorrectly. |
|
philsmd |
hashcat
|
5 |
2,170 |
09-19-2019, 06:45 PM |
|
|
Thread: Possible to use CUDA and OpenCL side-by-side?
Post: RE: Possible to use CUDA and OpenCL side-by-side?
yeah, we actually had a similar request/question like this on IRC and the "only problem" is to get the different drivers correctly installed at the same time.
It's easier on some operating systems co... |
|
philsmd |
hashcat
|
5 |
2,170 |
09-19-2019, 11:17 AM |
|
|
Thread: How to use checkpoint in hashcat beta (Windows)
Post: RE: How to use checkpoint in hashcat beta (Windows...
https://hashcat.net/faq#can_i_restore_a_hashcat_session
"The only parameters allowed when restoring a session are --restore and --session (optional)" |
|
philsmd |
hashcat
|
5 |
2,167 |
07-21-2019, 03:35 PM |
|
|
Thread: http authentication
Post: RE: http authentication
The format is as explained here: https://github.com/hashcat/hashcat/issues/1021 just this one:
$sip$*[URI_SERVER]*[URI_CLIENT]*[USERNAME]*[REALM]*[METHOD]*[URI_PREFIX]*[URI_RESOURCE]*[URI_SUFFIX]*[NON... |
|
philsmd |
hashcat
|
1 |
2,164 |
11-28-2017, 05:16 PM |
|
|
Thread: Hashcat Caching Previously Calculated Hashes
Post: RE: Hashcat Caching Previously Calculated Hashes
there is no such additional cache for storing cracked hashes except the potfile.
Maybe you are confusing the startup time with the OpenCL kernel compilation time, which only happens once for each k... |
|
philsmd |
hashcat
|
3 |
2,153 |
03-27-2019, 08:25 PM |
|
|
Thread: Hashcat Caching Previously Calculated Hashes
Post: RE: Hashcat Caching Previously Calculated Hashes
I'm not 100% sure what you are seeing/experiencing over there, but also remember that hashcat is highly parallelized and therefore all your OpenCL devices and all cores of just a single device (CPU/GP... |
|
philsmd |
hashcat
|
3 |
2,153 |
03-28-2019, 08:13 PM |
|
|
Thread: Wallet.DAT Master Key
Post: RE: Wallet.DAT Master Key
can you please give more detail about what software this is from and why you think it is sha3 etc ?
normally every bitcoin wallet.dat file is just simple used together with bitcoin2john.py and the ... |
|
philsmd |
hashcat
|
4 |
2,148 |
02-20-2020, 12:45 AM |
|
|
Thread: how to make an attack
Post: RE: how to make an attack
probably just an escaping problem. for instance use "$-" instead on some operating system, some need \$- etc.
I would test with a rule that doesn't need escaping at all, like:
hashcat -j u ...
... |
|
philsmd |
hashcat
|
4 |
2,139 |
06-25-2019, 08:08 AM |
|
|
Thread: SCRYPT speed trouble
Post: RE: SCRYPT speed trouble
you need to INSTALL the runtime:
https://software.intel.com/en-us/articles/opencl-drivers#cpu-section |
|
philsmd |
hashcat
|
4 |
2,128 |
10-15-2019, 11:30 AM |
|
|
Thread: A good hash ???
Post: RE: A good hash ???
We already explained this to you here:
https://hashcat.net/forum/thread-6609-post-36090.html#pid36090
axcrypt2john.py includes the file name and hashcat doesn't need that.
either use --username o... |
|
philsmd |
hashcat
|
1 |
2,126 |
08-25-2017, 08:52 PM |
|
|
Thread: mask processor
Post: RE: mask processor
use .hcmask file for several different masks https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
my.hcmask
Code:
--
?l?l?l?l?l?l?l?l
?l?l?l?l?l?l?l?d
?l?l?l?l?l?l?d?l
?l?l?l?... |
|
philsmd |
General Talk
|
3 |
2,104 |
04-02-2019, 01:04 PM |
|
|
Thread: Hashcat64 Insufficient memory available
Post: RE: Hashcat64 Insufficient memory available
you need to specify the hash file first (as mentioned within the first lines of --help)
hashcat -m 16800 -a 0 -w 4 hash.txt dict.txt |
|
philsmd |
hashcat
|
4 |
2,085 |
07-30-2019, 07:01 PM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
I don't think the grep test is a good/valid test.
There could be any other (even non-printable) character within that line and therefore the combined (concatenated) result is different.
You coul... |
|
philsmd |
hashcat
|
10 |
2,085 |
03-26-2020, 06:31 PM |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
This command:
Code:
--
xxd -p
--
... unfortunately adds newlines within the hexadecimal output if a certain line line was reached. Try it yourself
Code:
--
echo -n aaaaaaaaaaaaaaaaaaaaaa... |
|
philsmd |
hashcat
|
10 |
2,085 |
03-27-2020, 09:53 AM |