Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: how to crack a windows 10 local user password hash(Netnlm capture)
Post: RE: how to crack a windows 10 local user password ...
Replace
Code:
--
-i 5:15
--
by the correct syntax
[spoil]-i --increment-min 5 ---increment-max 15[/spoil]
You can remove --i if you do not need to increment. |
|
Mem5 |
hashcat
|
14 |
4,707 |
08-13-2019, 09:45 AM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: "bug!!" in output / ocl v1.36
Hello,
Fresh install of Windwos 8.1, Catalyst 14.9, on Radeon R9 290
Apparently (?) same bug as https://hashcat.net/trac/ticket/593
Running oclhashcat 1.36, cmdline :
Code:
--
oclHashcat64.exe ... |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
07-25-2015, 11:46 AM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
Same error (randomly) with this command line (wpa) :
oclHashcat-1.36\oclHashcat64.exe --remove --gpu-temp-abort=90 -w 3 -m 2500 -o res.txt aaa.hccap *.dic |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
07-26-2015, 09:09 PM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
Please note that version 1.35 gives much less error "bug!!" than 1.36.
I hope it will help you ! |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
07-28-2015, 11:08 PM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
v1.37 also gives me, randomly, the "bug!!" output.
Do you have any ideas of the problem ? |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
08-23-2015, 10:40 AM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
Hum, I found where it may comes from : one of my wordlist.
A word inside certainly causes ocl v1.37 an lower to crash (prints bug!!)
Any idea how to spot it ?
I used ULM to clean it : purge unicode c... |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
08-23-2015, 11:14 AM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
08-23-2015, 01:12 PM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
Tested with :
v1.31 : OK
v1.32 : OK
v1.33 : bug
v1.34 : bug
v1.35 : bug
v1.36 : bug
v1.37 : bug |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
08-23-2015, 01:21 PM |
|
|
Thread: "bug!!" in output / ocl v1.36
Post: RE: "bug!!" in output / ocl v1.36
@atom Thanks for trying.
Sadly so hard to reproduce :(
Finally v1.32 also gives me "bug!!".
So, only the v1.31 _never_ gave me that bug.
- Maybe you could check what's changed between v1.31 and v1.... |
|
Mem5 |
Old oclHashcat Support
|
13 |
17,472 |
08-24-2015, 09:45 PM |
|
|
Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?
It means :
Code:
--
hashcat64.exe -m 2500 -1 ?d?u?l davehash.hccapx ?1?1?1?1?1?1?1?1?1?1?1?1
--
Hint: I don't know your graphic card but it will last some months ;-) |
|
Mem5 |
hashcat
|
13 |
12,975 |
06-19-2017, 10:48 PM |
|
|
Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?
Your problem is not about the lenght of mask, but "Time.Estimated...: Thu Aug 20 05:19:43 2020 (46696 years, 52 days)"
Cracking WPA is slow. If you ask for 12 chars (lower-upper-digits) it will take ... |
|
Mem5 |
hashcat
|
13 |
12,975 |
06-20-2017, 10:24 AM |
|
|
Thread: Old Office and KDF
Post: Old Office and KDF
Hello,
I am trying to crack an old-office hash following the steps given at https://hashcat.net/forum/thread-3665-post-20935.html#pid20935 :
Thanks to mode 9710 I found : 'deebd8f416' as ou... |
|
Mem5 |
hashcat
|
13 |
10,123 |
01-19-2018, 08:15 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
I don't know what to do with the last MD5 I've computed. |
|
Mem5 |
hashcat
|
13 |
10,123 |
01-20-2018, 12:43 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
All. I don't see where hashcat can help me to do these steps, so I guess I need to code in python or C++ to deal with RC4 decryption and encryptedVerifier?
If yes, are you aware of an existing code t... |
|
Mem5 |
hashcat
|
13 |
10,123 |
01-20-2018, 12:34 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Hum, I'm confused as philsmd wrote:
philsmd Wrote: (09-12-2017, 05:00 PM)
--
If you read this carefully https://hashcat.net/forum/thread-3665.html, you will see that you only need -m 9710 to acces... |
|
Mem5 |
hashcat
|
13 |
10,123 |
01-23-2018, 11:59 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
atom Wrote: (01-24-2018, 11:02 AM)
--
Just use -m 9700 then and crack as normal
--
Do you mean bruteforce or wordlist attack ? But if the password is more than 30 characters I won't be able to re... |
|
Mem5 |
hashcat
|
13 |
10,123 |
01-25-2018, 10:58 PM |
|
|
Thread: hashcat v4.1.0
Post: RE: hashcat v4.1.0
Awesome as usual, thanks! |
|
Mem5 |
hashcat
|
13 |
32,462 |
02-22-2018, 12:02 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Thanks atom.
I use this cmdline: hashcat64 -m 9800 -a 3 -w 4 -O office.hash ?a?a?a?a?a?a?a?a?a
After 30 hours (on 2x1080), nothing cracked so far.
Wha do you mean by "pretty soon" ? :D |
|
Mem5 |
hashcat
|
13 |
10,123 |
02-25-2018, 11:32 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Same behaviour with 9700 by the way. I've tried both. |
|
Mem5 |
hashcat
|
13 |
10,123 |
02-25-2018, 02:52 PM |
|
|
Thread: Ransomware
Post: RE: Ransomware
We may better help you if we know the encryption algorithm used by the ransoware? |
|
Mem5 |
hashcat
|
13 |
7,567 |
12-13-2018, 07:56 PM |