Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...

it should also work with just adding -S to the command line
philsmd User Contributions 648 487,275 01-12-2020, 07:10 PM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

OMG, amazing! Well done atom
philsmd Very old oclHashcat-plus Support 44 362,064 04-16-2013, 05:26 PM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

Quote: -- In the new format that I mentioned, we actually make this last bit easier for you (by design). -- Thx you, nice to collaborate w/ us.
philsmd Very old oclHashcat-plus Support 44 362,064 04-16-2013, 06:32 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

If I'm not totally (I mean completely!!!) mistaken you are totally looking at the wrong code. The code posted by mrfancypants here: https://repl.it/JMbi/4 is not (just) the key generator. This is a ...
philsmd User Contributions 182 305,384 07-16-2017, 09:11 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

Please be more specific at which code you are refering to. There are a lot of code snippets within this thread, e.g. 2 for different algorithms, one for searching a (8 char) substring of a specific pa...
philsmd User Contributions 182 305,384 07-18-2017, 08:32 AM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

it could be that for the 5268AC the formula is just a little bit different, e.g while we have the formula 2 ^ 32 + 2 for the 599, it could be that the formula for 5268AC is almost the same i.e. 2 ^ 32...
philsmd User Contributions 182 305,384 07-24-2017, 01:55 PM
    Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers

why don't you just simple use the .exe file within that repo (yeah, I agree it's very bad to put executable files into source code repositories, but maybe this is a proof that users really have a hard...
philsmd User Contributions 182 305,384 07-02-2020, 06:15 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

@gat3way Found another strange file on my phone /data/system/device_policies.xml Code: -- -- I think they are missing an important attribute here, namely: plain="1111" Lol What the...
philsmd User Contributions 47 208,552 04-12-2013, 11:04 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

omg, is this for real? so you can attack both algorithms? I mean, you can attack the least secure, the faster? My question here is, is this really Samsung specific? This post e.g. says this is ...
philsmd User Contributions 47 208,552 04-12-2013, 08:27 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

Yes, we recently discussed the pattern hash here too: https://hashcat.net/forum/thread-2165.html I know that there are so many stupid and unbelievable things out there, especially if you do some secur...
philsmd User Contributions 47 208,552 04-12-2013, 10:03 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

It is the device password! If I change my pin to 8 digits there is a very slight change: length="8" ... numeric="8" ... nonletter="8" It seems fun, but it really isn't. For shame!!! Anyone can confir...
philsmd User Contributions 47 208,552 04-12-2013, 12:02 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

It seems to log into a rooted device you only need to *remove* this policy file and reboot: https://www.digitalmobile.in/community/threads/remove-pattern-lock-of-any-android-device.1893/ EDIT: But o...
philsmd User Contributions 47 208,552 04-12-2013, 12:25 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail. Of course this conversion is easy, but maybe someone di...
philsmd User Contributions 47 208,552 04-12-2013, 03:33 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t...
philsmd User Contributions 47 208,552 01-09-2014, 03:03 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c...
philsmd User Contributions 47 208,552 03-03-2015, 02:41 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

This is very easy to crack (and to find out what algo is used), you just need to investigate a little bit and make some tests, see my tests: Code: -- ./oclHashcat64.bin --quiet -m 110 7baad69b719...
philsmd User Contributions 47 208,552 05-27-2015, 11:28 AM
    Thread: New hccapx format explained
Post: RE: New hccapx format explained

if you see that error, just increase the DB_ESSID_MAX value to whatever value you feel comfortable. The risk of doing this is that it might use much more RAM. So you should do it at your own risk. We...
philsmd User Contributions 49 179,646 02-09-2017, 02:15 PM
    Thread: New hccapx format explained
Post: RE: New hccapx format explained

@c4pOne you should definitely make sure you are using the latest version of hashcat-utils (v1.5 or higher), because as you can read/see here https://github.com/hashcat/hashcat-utils/releases, the wind...
philsmd User Contributions 49 179,646 02-10-2017, 10:51 AM
    Thread: New hccapx format explained
Post: RE: New hccapx format explained

@abdou99 If you are talking about this screenshot https://hashcat.net/wiki/hccapx#screenshot (you didn't say that explicitly), than you should read the section below the image: Quote: -- authentic...
philsmd User Contributions 49 179,646 02-10-2017, 02:20 PM
    Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...

you could for instance just decrypt/open the file (I already mentioned how to do this with libreoffice here: https://hashcat.net/forum/thread-7216-post-39498.html#pid39498)
philsmd User Contributions 36 134,711 05-25-2018, 02:33 PM