Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: i cant convert a WPA / WPA2 pcap
Post: RE: i cant convert a WPA / WPA2 pcap
What's the tool & commandline used? |
|
Mem5 |
General Talk
|
3 |
2,373 |
01-16-2019, 06:08 PM |
|
|
Thread: Renting out rigs?
Post: RE: Renting out rigs?
www.vast.ai guys will rent your gpus |
|
Mem5 |
General Talk
|
1 |
1,635 |
05-02-2019, 12:33 PM |
|
|
Thread: Hashes export
Post: RE: Hashes export
MD5 Wordpress is also known as phpass, to extract them from your database (assuming it's a text/csv), regex on :
- start with "$P$"
- length : 34 characters.
Once extracted, run hashcat mode (-m) 40... |
|
Mem5 |
General Talk
|
6 |
2,969 |
06-08-2019, 04:59 PM |
|
|
Thread: Hashes export
Post: RE: Hashes export
What's the format of your database? |
|
Mem5 |
General Talk
|
6 |
2,969 |
06-08-2019, 08:58 PM |
|
|
Thread: Benchmark 2x tesla v100
Post: RE: Benchmark 2x tesla v100
Thanks.
I confirm RTX 2080 Ti is a bit faster and cheaper. |
|
Mem5 |
General Talk
|
1 |
2,058 |
06-17-2019, 07:32 PM |
|
|
Thread: Hashcat has won CMIYC 2019
Post: RE: Hashcat has won CMIYC 2019
|
Mem5 |
General Talk
|
1 |
1,112 |
08-13-2019, 09:47 AM |
|
|
Thread: LM Hashes
Post: RE: LM Hashes
What's the Windows version?
LM can be stored, but NTLM can be stored and used as well.
Your LM password is uppercase (LM works like this) but NTLM is case sensitive.
So if NTLM is used, your passwo... |
|
Mem5 |
General Talk
|
11 |
5,707 |
08-21-2019, 05:33 PM |
|
|
Thread: Best way to crack emails?
Post: Best way to crack emails?
Hi,
Please share here your hints about cracking emails.
I personally use :
- facebook names wordlist (left side) + wordlist of email domains (gmail.com, hotmail, etc., right side) using combinator att... |
|
Mem5 |
General Talk
|
3 |
1,906 |
10-06-2019, 11:04 AM |
|
|
Thread: Best way to crack emails?
Post: RE: Best way to crack emails?
Do you mean that my rule file should contain:
Code:
--
$@$g$m$a$i$l$.$c$o$m
...
--
? |
|
Mem5 |
General Talk
|
3 |
1,906 |
10-06-2019, 03:34 PM |
|
|
Thread: Running hashcat on multiple hash files
Post: RE: Running hashcat on multiple hash files
Have you tried to cat them all in one file? |
|
Mem5 |
General Talk
|
5 |
3,007 |
10-23-2019, 09:26 PM |
|
|
Thread: Creating Custom Password List
Post: RE: Creating Custom Password List
slawson Wrote: (10-23-2019, 10:48 PM)
--
is there any way to decrease the last two digits by one hex value?
--
I would build an array and walk through it. |
|
Mem5 |
General Talk
|
6 |
2,559 |
10-23-2019, 11:08 PM |
|
|
Thread: Creating Custom Password List
Post: RE: Creating Custom Password List
%x tells printf to print the variable in lower-case hexadecimal, to be able then to decrease the value by 1. |
|
Mem5 |
General Talk
|
6 |
2,559 |
10-24-2019, 10:08 PM |
|
|
Thread: Running hashcat on multiple hash files
Post: RE: Running hashcat on multiple hash files
slawson Wrote: (10-23-2019, 09:40 PM)
--
copy /b *.16800 all.16800
--
Pay attention,
/B Indicates a binary file
While 16800 mode is text only. |
|
Mem5 |
General Talk
|
5 |
3,007 |
10-29-2019, 09:06 AM |
|
|
Thread: 2080 ti 2500 50kh's
Post: RE: 2080 ti 2500 50kh's
-w 4 is an optimization, a workload profile, and 4 is 'nightmare', good for headless server.
Regarding to benchmark, look at this one (https://www.onlinehashcrack.com/tools-benchmark-hashcat-gtx-1080-... |
|
Mem5 |
General Talk
|
5 |
1,477 |
03-22-2020, 12:07 AM |
|
|
Thread: help rar5 lost password
Post: RE: help rar5 lost password
English please.
Step 1 : extract a hash from your archive file (via John executable (https://github.com/magnumripper/JohnTheRipper) or online (https://www.onlinehashcrack.com/tools-zip-rar-7z-archiv... |
|
Mem5 |
General Talk
|
2 |
950 |
03-25-2020, 11:07 PM |
|
|
Thread: Dictiionary Attack - how-to-question
Post: RE: Dictiionary Attack - how-to-question
You don't need -a 0 (optional)
Why -d 2 ? if you have several GPUs it's better to run hashcat on all GPUs (what you don't do here) |
|
Mem5 |
General Talk
|
29 |
5,284 |
04-17-2020, 06:15 PM |
|
|
Thread: WPA3 Dragonblood Vulnerabilities Disclosure
Post: RE: WPA3 Dragonblood Vulnerabilities Disclosure
Hi,
How does hcxdumptool work with WPA3?
Do you reuse tools from Dragloblood?
Handshakes and PMKID extraction is no longer possible? |
|
Mem5 |
General Talk
|
5 |
3,493 |
05-14-2020, 09:51 AM |
|
|
Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)
+1 with royce, don't see the point to use crunch with hashcat.. |
|
Mem5 |
General Talk
|
4 |
1,523 |
05-20-2020, 11:58 AM |
|
|
Thread: Password-based Uniform-Random-Equivalent Encryption
Post: Password-based Uniform-Random-Equivalent Encryptio...
Interesting.. https://puree.cc (https://puree.cc/) and white paper (https://puree.cc/puree.pdf)
Quote:
--
PUREE is a full-disk encryption header format (and tool, currently only supported on Linux... |
|
Mem5 |
General Talk
|
1 |
557 |
06-13-2020, 02:31 PM |
|
|
Thread: Hello all, someone who work with python canl help me
Post: RE: Hello all, someone who work with python canl h...
To refresh status without pressing 's', add
Code:
--
--status --status-timer=X
--
where X is the number of seconds between 2 refresh.
To display only Candidates, you'll need to grep on output. |
|
Mem5 |
General Talk
|
4 |
909 |
07-15-2020, 10:39 PM |