Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Password wallet recovery wasabi
Post: RE: Password wallet recovery wasabi
|
Mem5 |
hashcat
|
16 |
3,272 |
04-02-2020, 06:58 PM |
|
|
Thread: hashcat on raspberry pi 4
Post: RE: hashcat on raspberry pi 4
Still not.
Only x86 and x64. |
|
Mem5 |
hashcat
|
3 |
1,258 |
04-02-2020, 06:59 PM |
|
|
Thread: How to capture Handshake correctly in a fast way?
Post: RE: How to capture Handshake correctly in a fast w...
Install and use https://github.com/ZerBea/hcxdumptool |
|
Mem5 |
hashcat
|
1 |
587 |
04-06-2020, 10:32 PM |
|
|
Thread: Rules attack - restore not working
Post: RE: Rules attack - restore not working
which algorithm? command line? |
|
Mem5 |
hashcat
|
8 |
1,537 |
04-17-2020, 06:16 PM |
|
|
Thread: Bruteforcing SHA1 with knowing the salt
Post: RE: Bruteforcing SHA1 with knowing the salt
"take longer time" compared to what ?
Mast attack : https://hashcat.net/wiki/doku.php?id=mask_attack |
|
Mem5 |
hashcat
|
5 |
1,291 |
04-17-2020, 06:22 PM |
|
|
Thread: HascatGUI + RIGS
Post: RE: HascatGUI + RIGS
hashcat yes, see Brain features.
hashcatGUI is not developed nor supported here, please ask its author. |
|
Mem5 |
hashcat
|
1 |
694 |
05-05-2020, 10:56 AM |
|
|
Thread: Newbie learning how to crack a RAR3 hash.
Post: RE: Newbie learning how to crack a RAR3 hash.
You hash is not well formatted, have a look at https://hashcat.net/wiki/doku.php?id=example_hashes :
Code:
--
$RAR3$*0*45109af8ab5f297a*adbf6c5385d7a40373e8f77d7b89d317
--
You hash must look like thi... |
|
Mem5 |
hashcat
|
5 |
1,172 |
05-07-2020, 11:37 AM |
|
|
Thread: How this can be possible?
Post: RE: How this can be possible?
Uraniumhazee Wrote: (04-16-2020, 02:33 AM)
--
same router mac same client mac same router name but different pass hashes?
--
- PMKID are NOT the same
- Station mac are NOT the same (b8b7f14164f4 &... |
|
Mem5 |
hashcat
|
3 |
974 |
04-17-2020, 06:20 PM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
You can SHORT it with : -1 ?l?u?d ?1?1...
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
d | 0123456789
If you want to REDUCE the keyspace: remove some characters, for that you need... |
|
Mem5 |
hashcat
|
6 |
1,462 |
05-07-2020, 07:17 PM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
doggod Wrote: (05-08-2020, 11:58 AM)
--
Where can I get access?
--
You can buy (https://www.newegg.com) or rent (https://www.onlinehashcrack.com/how-to-configure-bruteforce-attack.php) |
|
Mem5 |
hashcat
|
6 |
1,462 |
05-09-2020, 01:28 PM |
|
|
Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode
I'll add that ?a contains symbols, which you don"t want according to your passwords ("FvL6, wm4n") |
|
Mem5 |
hashcat
|
7 |
1,538 |
05-10-2020, 09:44 AM |
|
|
Thread: Maskprocessor Help Windows 10
Post: RE: Maskprocessor Help Windows 10
Common methodology is to use wordlists first ant then bruteforce.
You can rent GPUs if your need is punctual |
|
Mem5 |
hashcat
|
12 |
2,253 |
05-11-2020, 06:21 PM |
|
|
Thread: 3des comand
Post: RE: 3des comand
It's not "a part of the command", it's just the help file.
To attack 3DES set "-m" switch to 14100
Example:
Code:
--
hashcat -m 14100 wordlist hashfile
--
where wordlist contains a list of passwords ... |
|
Mem5 |
hashcat
|
3 |
818 |
05-13-2020, 03:07 PM |
|
|
Thread: AMD Rx5700 can't run WPA normally
Post: RE: AMD Rx5700 can't run WPA normally
Best cards are (order by price desc) 2080 ti, 2080, 1080 ti, 1080. |
|
Mem5 |
hashcat
|
5 |
1,197 |
05-13-2020, 05:10 PM |
|
|
Thread: AMD Rx5700 can't run WPA normally
Post: RE: AMD Rx5700 can't run WPA normally
adminqiqi Wrote: (05-14-2020, 11:19 AM)
--
Is 2070s OK?
--
Yep |
|
Mem5 |
hashcat
|
5 |
1,197 |
05-14-2020, 11:31 AM |
|
|
Thread: Brute-Force mask
Post: RE: Brute-Force mask
Depends on the algorithm, bcrypt or NTLM ? |
|
Mem5 |
hashcat
|
4 |
1,108 |
05-20-2020, 11:55 AM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: On-the-fly loading of gz wordlists
Quote:
--
* changes v5.1.0 -> v6.0.0
(...)
- Support on-the-fly loading of compressed wordlists in zip and gzip format
--
Seen in hashcat beta 1803.
Just tried with a gz file:
Code:
--
$ wc -l �... |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-23-2020, 06:04 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Weird.. I may have failed somewhere in the compress step.. |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-23-2020, 08:48 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
From a performance perspective I cannot see any loss of speed; how does hashcat handle gigas of compressed wordlist without spending minutes/hours on decompression? |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-24-2020, 12:33 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Ok.. but what about "Dictionary cache building", hashcat have to decompress all the file first to know the statistics, number of passwords etc? |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-25-2020, 08:38 PM |