Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: Output password verbose viewing for wpa-wpa2?
Post: RE: Output password verbose viewing for wpa-wpa2?
You can use the tool maskprocessor to see your generated words in output. |
|
Mem5 |
Old oclHashcat Support
|
6 |
15,082 |
03-24-2014, 09:26 AM |
|
|
Thread: OSX hash
Post: RE: OSX hash
Sorry for the hashes.
Quote:
--
You don't get the same hash because you don't use the salt.
--
Quote:
--
also notice the salt is encoded in hex
--
So I did :
$salt_as_string = hex2string($... |
|
Mem5 |
General Help
|
4 |
8,739 |
02-15-2012, 08:14 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: RE: OS X Bug ? Or.. ?
Thanks, but the empty hash is 3E8ED8FC0C6AC6C17CB6EFCBE43BF31E765F8F456B2A6500
this thread https://hashcat.net/forum/thread-1360-post-7493.html said that.
i am confused :s
atom Wrote:
--
Yes, its an ... |
|
Mem5 |
Old oclHashcat Support
|
4 |
7,195 |
01-10-2014, 11:44 PM |
|
|
Thread: OS X Bug ? Or.. ?
Post: RE: OS X Bug ? Or.. ?
Humm right I got it. I forgot the salt.
Is there a way to know when a hash is the empty string or not ?
Thank you. |
|
Mem5 |
Old oclHashcat Support
|
4 |
7,195 |
01-11-2014, 04:27 PM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
You can SHORT it with : -1 ?l?u?d ?1?1...
l | abcdefghijklmnopqrstuvwxyz
u | ABCDEFGHIJKLMNOPQRSTUVWXYZ
d | 0123456789
If you want to REDUCE the keyspace: remove some characters, for that you need... |
|
Mem5 |
hashcat
|
6 |
1,462 |
05-07-2020, 07:17 PM |
|
|
Thread: Optimize mask bruteforce PMKID
Post: RE: Optimize mask bruteforce PMKID
doggod Wrote: (05-08-2020, 11:58 AM)
--
Where can I get access?
--
You can buy (https://www.newegg.com) or rent (https://www.onlinehashcrack.com/how-to-configure-bruteforce-attack.php) |
|
Mem5 |
hashcat
|
6 |
1,462 |
05-09-2020, 01:28 PM |
|
|
Thread: Openwall cracker ?!
Post: RE: Openwall cracker ?!
atom Wrote: (01-27-2014, 07:20 PM)
--
The original bitslice DES/LM source was posted on reddit a while back and at this time it was doing around 3000M c/s. I was able to improve it to around 6400M c/... |
|
Mem5 |
Old oclHashcat Support
|
4 |
11,025 |
01-29-2014, 04:40 PM |
|
|
Thread: Openwall cracker ?!
Post: RE: Openwall cracker ?!
Considering oclhashcat last version and this command line :
Code:
--
-a 3 -m 3000 -n 160 --markov-disable -i --increment-min 1 --increment-max 7 -1 ?u?d?s 1000_hashes.txt ?1?1?1?1?1?1?1
--
Speed i... |
|
Mem5 |
Old oclHashcat Support
|
4 |
11,025 |
01-30-2014, 06:55 PM |
|
|
Thread: OpenCL errors
Post: RE: OpenCL errors
Try again:
- with latest version : 5.1.0 https://hashcat.net/files/hashcat-5.1.0.7z
- without --force option
and post again. |
|
Mem5 |
hashcat
|
4 |
2,937 |
12-10-2018, 10:28 AM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Weird.. I may have failed somewhere in the compress step.. |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-23-2020, 08:48 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
From a performance perspective I cannot see any loss of speed; how does hashcat handle gigas of compressed wordlist without spending minutes/hours on decompression? |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-24-2020, 12:33 PM |
|
|
Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists
Ok.. but what about "Dictionary cache building", hashcat have to decompress all the file first to know the statistics, number of passwords etc? |
|
Mem5 |
hashcat
|
6 |
1,379 |
05-25-2020, 08:38 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
I don't know what to do with the last MD5 I've computed. |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-20-2018, 12:43 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
All. I don't see where hashcat can help me to do these steps, so I guess I need to code in python or C++ to deal with RC4 decryption and encryptedVerifier?
If yes, are you aware of an existing code t... |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-20-2018, 12:34 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Hum, I'm confused as philsmd wrote:
philsmd Wrote: (09-12-2017, 05:00 PM)
--
If you read this carefully https://hashcat.net/forum/thread-3665.html, you will see that you only need -m 9710 to acces... |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-23-2018, 11:59 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
atom Wrote: (01-24-2018, 11:02 AM)
--
Just use -m 9700 then and crack as normal
--
Do you mean bruteforce or wordlist attack ? But if the password is more than 30 characters I won't be able to re... |
|
Mem5 |
hashcat
|
13 |
10,132 |
01-25-2018, 10:58 PM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Thanks atom.
I use this cmdline: hashcat64 -m 9800 -a 3 -w 4 -O office.hash ?a?a?a?a?a?a?a?a?a
After 30 hours (on 2x1080), nothing cracked so far.
Wha do you mean by "pretty soon" ? :D |
|
Mem5 |
hashcat
|
13 |
10,132 |
02-25-2018, 11:32 AM |
|
|
Thread: Old Office and KDF
Post: RE: Old Office and KDF
Same behaviour with 9700 by the way. I've tried both. |
|
Mem5 |
hashcat
|
13 |
10,132 |
02-25-2018, 02:52 PM |
|
|
Thread: Office Word Password
Post: RE: Office Word Password
List of supported algorithms : https://hashcat.net/hashcat/ (not office) |
|
Mem5 |
Old hashcat Support
|
4 |
9,085 |
01-29-2016, 04:58 PM |
|
|
Thread: Office collision: 7 or more characters?
Post: RE: Office collision: 7 or more characters?
The command:
Quote:
--
hashcat64.exe -w 3 -m 9720 tmp_office.txt -a 3 ?a?a?a?a?a?a?a
--
does not give any collisions. For the first time ever.
Am I doing something wrong ? |
|
Mem5 |
hashcat
|
3 |
4,025 |
12-28-2016, 05:22 PM |