Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: hcxtools - solution for capturing wlan traffic and conversion to hashcat formats
Post: RE: hcxtools - solution for capturing wlan traffic...
it should also work with just adding -S to the command line |
|
philsmd |
User Contributions
|
648 |
487,117 |
01-12-2020, 07:10 PM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
OMG, amazing! Well done atom |
|
philsmd |
Very old oclHashcat-plus Support
|
44 |
362,058 |
04-16-2013, 05:26 PM |
|
|
Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?
Quote:
--
In the new format that I mentioned, we actually make this last bit easier for you (by design).
--
Thx you, nice to collaborate w/ us. |
|
philsmd |
Very old oclHashcat-plus Support
|
44 |
362,058 |
04-16-2013, 06:32 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
If I'm not totally (I mean completely!!!) mistaken you are totally looking at the wrong code.
The code posted by mrfancypants here: https://repl.it/JMbi/4
is not (just) the key generator.
This is a ... |
|
philsmd |
User Contributions
|
182 |
305,375 |
07-16-2017, 09:11 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
Please be more specific at which code you are refering to. There are a lot of code snippets within this thread, e.g. 2 for different algorithms, one for searching a (8 char) substring of a specific pa... |
|
philsmd |
User Contributions
|
182 |
305,375 |
07-18-2017, 08:32 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
it could be that for the 5268AC the formula is just a little bit different, e.g while we have the formula 2 ^ 32 + 2 for the 599, it could be that the formula for 5268AC is almost the same i.e. 2 ^ 32... |
|
philsmd |
User Contributions
|
182 |
305,375 |
07-24-2017, 01:55 PM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
why don't you just simple use the .exe file within that repo (yeah, I agree it's very bad to put executable files into source code repositories, but maybe this is a proof that users really have a hard... |
|
philsmd |
User Contributions
|
182 |
305,375 |
07-02-2020, 06:15 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
@gat3way
Found another strange file on my phone /data/system/device_policies.xml
Code:
--
--
I think they are missing an important attribute here, namely: plain="1111"
Lol
What the... |
|
philsmd |
User Contributions
|
47 |
208,551 |
04-12-2013, 11:04 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
omg, is this for real?
so you can attack both algorithms? I mean, you can attack the least secure, the faster?
My question here is, is this really Samsung specific?
This post e.g. says this is ... |
|
philsmd |
User Contributions
|
47 |
208,551 |
04-12-2013, 08:27 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Yes, we recently discussed the pattern hash here too: https://hashcat.net/forum/thread-2165.html
I know that there are so many stupid and unbelievable things out there, especially if you do some secur... |
|
philsmd |
User Contributions
|
47 |
208,551 |
04-12-2013, 10:03 AM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
It is the device password! If I change my pin to 8 digits there is a very slight change:
length="8" ... numeric="8" ... nonletter="8"
It seems fun, but it really isn't. For shame!!!
Anyone can confir... |
|
philsmd |
User Contributions
|
47 |
208,551 |
04-12-2013, 12:02 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
It seems to log into a rooted device you only need to *remove* this policy file and reboot:
https://www.digitalmobile.in/community/threads/remove-pattern-lock-of-any-android-device.1893/
EDIT: But o... |
|
philsmd |
User Contributions
|
47 |
208,551 |
04-12-2013, 12:25 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail.
Of course this conversion is easy, but maybe someone di... |
|
philsmd |
User Contributions
|
47 |
208,551 |
04-12-2013, 03:33 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t... |
|
philsmd |
User Contributions
|
47 |
208,551 |
01-09-2014, 03:03 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes
For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c... |
|
philsmd |
User Contributions
|
47 |
208,551 |
03-03-2015, 02:41 PM |
|
|
Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN
This is very easy to crack (and to find out what algo is used), you just need to investigate a little bit and make some tests, see my tests:
Code:
--
./oclHashcat64.bin --quiet -m 110 7baad69b719... |
|
philsmd |
User Contributions
|
47 |
208,551 |
05-27-2015, 11:28 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
if you see that error, just increase the DB_ESSID_MAX value to whatever value you feel comfortable. The risk of doing this is that it might use much more RAM. So you should do it at your own risk.
We... |
|
philsmd |
User Contributions
|
49 |
179,644 |
02-09-2017, 02:15 PM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
@c4pOne you should definitely make sure you are using the latest version of hashcat-utils (v1.5 or higher), because as you can read/see here https://github.com/hashcat/hashcat-utils/releases, the wind... |
|
philsmd |
User Contributions
|
49 |
179,644 |
02-10-2017, 10:51 AM |
|
|
Thread: New hccapx format explained
Post: RE: New hccapx format explained
@abdou99 If you are talking about this screenshot https://hashcat.net/wiki/hccapx#screenshot (you didn't say that explicitly), than you should read the section below the image:
Quote:
--
authentic... |
|
philsmd |
User Contributions
|
49 |
179,644 |
02-10-2017, 02:20 PM |
|
|
Thread: Colliding password protected MS office 97-2003 documents
Post: RE: Colliding password protected MS office 97-2003...
you could for instance just decrypt/open the file (I already mentioned how to do this with libreoffice here: https://hashcat.net/forum/thread-7216-post-39498.html#pid39498) |
|
philsmd |
User Contributions
|
36 |
134,711 |
05-25-2018, 02:33 PM |