Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: SHA-256 64 char password
Post: RE: SHA-256 64 char password
Why are you sure it's 64 chars? You generated it? |
|
Mem5 |
hashcat
|
2 |
571 |
05-26-2020, 11:14 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Ok.. but what about "Dictionary cache building", hashcat have to decompress all the file first to know the statistics, number of passwords etc? |
|
Mem5 |
hashcat
|
6 |
1,377 |
05-25-2020, 08:38 PM |
|
|
Thread: What is the speed of Hashcat for cracking wallet.dat using GPU?
Post: RE: What is the speed of Hashcat for cracking wall...
If I am not mistaken the speed also depends on the iterations count (hashcat benchmark takes 199999)
Here is another benchmark for 10 * GTX 2080 Ti (source (https://www.onlinehashcrack.com/tools-benc... |
|
Mem5 |
hashcat
|
15 |
3,362 |
05-25-2020, 03:03 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
From a performance perspective I cannot see any loss of speed; how does hashcat handle gigas of compressed wordlist without spending minutes/hours on decompression? |
|
Mem5 |
hashcat
|
6 |
1,377 |
05-24-2020, 12:33 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Weird.. I may have failed somewhere in the compress step.. |
|
Mem5 |
hashcat
|
6 |
1,377 |
05-23-2020, 08:48 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: On-the-fly loading of gz wordlists
Quote:
--
* changes v5.1.0 -> v6.0.0
(...)
- Support on-the-fly loading of compressed wordlists in zip and gzip format
--
Seen in hashcat beta 1803.
Just tried with a gz file:
Code:
--
$ wc -l �... |
|
Mem5 |
hashcat
|
6 |
1,377 |
05-23-2020, 06:04 PM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
+1 with royce, don't see the point to use crunch with hashcat.. |
|
Mem5 |
General Talk
|
4 |
1,523 |
05-20-2020, 11:58 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
Depends on the algorithm, bcrypt or NTLM ? |
|
Mem5 |
hashcat
|
4 |
1,105 |
05-20-2020, 11:55 AM |
|
|
Thread: AMD Rx5700 can't run WPA normally
Post: RE: AMD Rx5700 can't run WPA normally
adminqiqi Wrote: (05-14-2020, 11:19 AM)
--
Is 2070s OK?
--
Yep |
|
Mem5 |
hashcat
|
5 |
1,194 |
05-14-2020, 11:31 AM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
Hi,
How does hcxdumptool work with WPA3?
Do you reuse tools from Dragloblood?
Handshakes and PMKID extraction is no longer possible? |
|
Mem5 |
General Talk
|
5 |
3,491 |
05-14-2020, 09:51 AM |
|
|
Thread: AMD Rx5700 can't run WPA normally
Post: RE: AMD Rx5700 can't run WPA normally
Best cards are (order by price desc) 2080 ti, 2080, 1080 ti, 1080. |
|
Mem5 |
hashcat
|
5 |
1,194 |
05-13-2020, 05:10 PM |
|
|
Thread: Need help with decryption rig
Post: RE: Need help with decryption rig
|
Mem5 |
Hardware
|
15 |
3,525 |
05-13-2020, 05:09 PM |
|
|
Thread: 3des comand
Post: RE: 3des comand
It's not "a part of the command", it's just the help file.
To attack 3DES set "-m" switch to 14100
Example:
Code:
--
hashcat -m 14100 wordlist hashfile
--
where wordlist contains a list of passwords ... |
|
Mem5 |
hashcat
|
3 |
816 |
05-13-2020, 03:07 PM |
|
|
Thread: Maskprocessor Help Windows 10
Post: RE: Maskprocessor Help Windows 10
Common methodology is to use wordlists first ant then bruteforce.
You can rent GPUs if your need is punctual |
|
Mem5 |
hashcat
|
12 |
2,245 |
05-11-2020, 06:21 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
I'll add that ?a contains symbols, which you don"t want according to your passwords ("FvL6, wm4n") |
|
Mem5 |
hashcat
|
7 |
1,534 |
05-10-2020, 09:44 AM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
doggod Wrote: (05-08-2020, 11:58 AM)
--
Where can I get access?
--
You can buy (https://www.newegg.com) or rent (https://www.onlinehashcrack.com/how-to-configure-bruteforce-attack.php) |
|
Mem5 |
hashcat
|
6 |
1,457 |
05-09-2020, 01:28 PM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
You can SHORT it with : -1 ?l?u?d ?1?1...
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
d | 0123456789
If you want to REDUCE the keyspace: remove some characters, for that you need... |
|
Mem5 |
hashcat
|
6 |
1,457 |
05-07-2020, 07:17 PM |
|
|
Thread: Newbie learning how to crack a RAR3 hash.
Post: RE: Newbie learning how to crack a RAR3 hash.
You hash is not well formatted, have a look at https://hashcat.net/wiki/doku.php?id=example_hashes :
Code:
--
$RAR3$*0*45109af8ab5f297a*adbf6c5385d7a40373e8f77d7b89d317
--
You hash must look like thi... |
|
Mem5 |
hashcat
|
5 |
1,169 |
05-07-2020, 11:37 AM |
|
|
Thread: Brute-Shark: A New Project that extract hashes from PCAP files
Post: RE: Brute-Shark: A New Project that extract hashes...
Thanks for sharing.
I knew Pcredz and Net-creds that seem to do the same.
Could you please explain what's new in your soft? |
|
Mem5 |
User Contributions
|
3 |
1,791 |
05-05-2020, 11:01 AM |
|
|
Thread: HascatGUI + RIGS
Post: RE: HascatGUI + RIGS
hashcat yes, see Brain features.
hashcatGUI is not developed nor supported here, please ask its author. |
|
Mem5 |
hashcat
|
1 |
692 |
05-05-2020, 10:56 AM |