Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Combinator attack missing correct candidate on large wordlist
Post: RE: Combinator attack missing correct candidate on...
Can you try cracking your hccapx file with -m 2500 (for testing purposes) ? |
|
philsmd |
hashcat
|
10 |
2,085 |
03-27-2020, 09:56 AM |
|
|
Thread: maskprocessor - how to combine letters and numbers?
Post: RE: maskprocessor - how to combine letters and num...
-1 ?l?u?d -q 4 -r 5 ?1?1?1?1?1?1?1 |
|
philsmd |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
2,084 |
07-17-2019, 11:05 AM |
|
|
Thread: Downloaded 3.6.0 but says I’m using v4.2.1 ??
Post: RE: Downloaded 3.6.0 but says I’m using v4.2.1 ?...
why do you use old versions in the first place ?
to run a command on any *nix based system (including macos and linux), you need to run it like this:
Code:
--
./hashcat --help
--
i.e. t... |
|
philsmd |
hashcat
|
6 |
2,080 |
07-26-2019, 05:04 PM |
|
|
Thread: Downloaded 3.6.0 but says I’m using v4.2.1 ??
Post: RE: Downloaded 3.6.0 but says I’m using v4.2.1 ?...
try to use the latest beta version from https://hashcat.net/beta |
|
philsmd |
hashcat
|
6 |
2,080 |
07-26-2019, 07:35 PM |
|
|
Thread: Downloaded 3.6.0 but says I’m using v4.2.1 ??
Post: RE: Downloaded 3.6.0 but says I’m using v4.2.1 ?...
well, I must admit that I forgot that we talked about macOS executable here.
Therefore for macOS you need to either use the github code and compile it yourself or use the homebrew packages which aren... |
|
philsmd |
hashcat
|
6 |
2,080 |
07-31-2019, 11:50 AM |
|
|
Thread: Wordlist + Bruteforce Attack
Post: RE: Wordlist + Bruteforce Attack
just read the output of
Code:
--
hashcat --help
--
it says
Code:
--
- [ Attack Modes ] -
...
6 | Hybrid Wordlist + Mask
--
therefore it is just:
Code:
--
hashcat -a 6 -m 1372... |
|
philsmd |
hashcat
|
2 |
2,079 |
12-27-2019, 07:55 PM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
the hashcat way of storing mask is hashcat mask files (hcmask):
https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_mask_files
my.hcmask:
Code:
--
123456789,?d-,abcdABCD?d,?3-,?1?2?4?3?3?... |
|
philsmd |
General Talk
|
8 |
2,070 |
05-29-2020, 09:24 PM |
|
|
Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack
for these numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25
you could just write several different mask like this:
Code:
--
123456789,?1
1?d
0123... |
|
philsmd |
General Talk
|
8 |
2,070 |
05-30-2020, 07:30 AM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
no, mask attack would be MUCH, MUCH faster if you just try "random passwords". every operation involving the disk would slow it down tremendously as already explained above when we compared -a 3 with ... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:28 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
mask attack: the candidates are directly generated/used on GPU, within the GPU kernel code
attack involving dictionaries (-a 0, -a 1, -a 6, -a 7): disk I/O bottleneck AND passwords need to be "send"/... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-06-2020, 12:41 PM |
|
|
Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...
if you have some specific idea, you could also develop/program your own password generator (for instance a python script or whatever) and pass the candidates to hashcat like this:
Code:
--
pytho... |
|
philsmd |
General Talk
|
10 |
2,064 |
07-07-2020, 08:33 AM |
|
|
Thread: question about hashcat speed slow?
Post: RE: question about hashcat speed slow?
Did you try to test -m 11600 with the beta version from https://hashcat.net/beta , it has several improvements for hook code (see https://github.com/hashcat/hashcat/commit/a8555fa048517bf352c0ba16745d... |
|
philsmd |
hashcat
|
7 |
2,061 |
01-24-2020, 11:58 AM |
|
|
Thread: Sanity check: "Must include chars" ruleset
Post: RE: Sanity check: "Must include chars" ruleset
If you are sure that the password length is just 10 and only 4 "random" chars, you could also use this approach. First, generate a dict (yes, this is normally not advicable, but for very small random ... |
|
philsmd |
hashcat
|
1 |
2,055 |
10-26-2017, 07:28 AM |
|
|
Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'
you could pre-generate the word list or just use -a 1 hash.txt dict1.txt dict2.txt
-a 1 also works with 3 combinations of works if dict1.txt hash already 2 words combined and you combine it one mor... |
|
philsmd |
hashcat
|
6 |
2,052 |
08-30-2019, 09:41 PM |
|
|
Thread: My master Password
Post: RE: My master Password
are you talking about blockchain.com / blockchain.info wallets ? what files do you have ?
hashcat supports these:
-m 12700 = Blockchain, My Wallet, $blockchain$...
-m 15200 = Blockchain, My Walle... |
|
philsmd |
hashcat
|
3 |
2,049 |
07-04-2019, 11:31 AM |
|
|
Thread: Old (2009) Bitcoin Core wallet hash problem
Post: RE: Old (2009) Bitcoin Core wallet hash problem
did you try to test with the beta version from https://hashcat.net/beta/ ? |
|
philsmd |
hashcat
|
2 |
2,044 |
04-06-2019, 09:39 PM |
|
|
Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length
this problem should be fixed with recent commits: https://github.com/hashcat/hashcat/commit/c78b8878d5e1c1304218cce53efcf3a52a1cb772
please test the beta at https://hashcat.net/beta/ and report bac... |
|
philsmd |
hashcat
|
6 |
2,043 |
10-18-2019, 09:48 AM |
|
|
Thread: Privilege Escalation Hash Type
Post: RE: Privilege Escalation Hash Type
while you are on that learning trip, I think it wouldn't hurt to read this about "encrypted passwords":
https://www.techsolvency.com/passwords/dehashing-reversing-decrypting/ |
|
philsmd |
hashcat
|
7 |
2,040 |
11-08-2019, 12:39 AM |
|
|
Thread: Problem - Signature unmatched No hashes loaded.
Post: RE: Problem - Signature unmatched No hashes loaded...
why do you not use a hash file, i.e. a file that contains the hash.
The shells (cmd/bash) have various special symbols that need to be escaped, it's always safer to use a file. |
|
philsmd |
hashcat
|
11 |
2,040 |
06-11-2020, 07:08 PM |
|
|
Thread: Problem - Signature unmatched No hashes loaded.
Post: RE: Problem - Signature unmatched No hashes loaded...
test with the example hash from https://hashcat.net/wiki/example_hashes (search from 15700 and copy the hash into a file).
If the example hash is loading correctly without any errors, try to change... |
|
philsmd |
hashcat
|
11 |
2,040 |
06-13-2020, 12:09 PM |