Search Results
|
Post
[asc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: New feature ? steganography bruteforce
Post: RE: New feature ? steganography bruteforce
|
Mem5 |
General Talk
|
3 |
10,014 |
01-01-2014, 07:35 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
It just misses a field to send a pmkid hash :) |
|
Mem5 |
User Contributions
|
187 |
1,293,339 |
08-27-2018, 07:24 PM |
|
|
Thread: New attack on WPA/WPA2 using PMKID
Post: RE: New attack on WPA/WPA2 using PMKID
"hashcat -m 16800 82445.16800 -a 3 -w 3 '?l?l?l?l?l?lt!' "
Change the mask, or use wordlist. |
|
Mem5 |
User Contributions
|
187 |
1,293,339 |
09-21-2018, 09:39 AM |
|
|
Thread: Need help with Intel CPU and NVIDIA GPU
Post: RE: Need help with Intel CPU and NVIDIA GPU
Which OS ? Which GPU ? CUDA or OpenCL ?
This is a good start : https://www.google.com/search?q=nvidia+driver |
|
Mem5 |
hashcat
|
43 |
4,390 |
07-29-2020, 12:10 PM |
|
|
Thread: Need help with decryption rig
Post: RE: Need help with decryption rig
|
Mem5 |
Hardware
|
15 |
3,529 |
05-13-2020, 05:09 PM |
|
|
Thread: Need help identifying a hash type.
Post: RE: Need help identifying a hash type.
You can use online tools, input your cleartext and comapre the hashes you will get with yours. |
|
Mem5 |
hashcat
|
1 |
1,333 |
05-17-2019, 09:56 PM |
|
|
Thread: Need help buying a rig, and not GPU based
Post: RE: Need help buying a rig, and not GPU based
GPUs (like 1070-1080-1080ti) are far better than CPU (even i9) |
|
Mem5 |
Hardware
|
3 |
3,308 |
02-25-2018, 02:54 PM |
|
|
Thread: need help about crack hash
Post: RE: need help about crack hash
nhatcto Wrote: (09-07-2014, 07:42 PM)
--
i try YES and didn't see anything diffirent in folder hashcat
--
It creates a file when you are agree with it. |
|
Mem5 |
General Help
|
20 |
32,451 |
09-07-2014, 08:17 PM |
|
|
Thread: Need assistance with command parameters.
Post: RE: Need assistance with command parameters.
Words from a language dictionary?
If yes, I would:
1) extract all words starting from 't' or 'T' => use grep
Code:
--
# sample wordlist t.dic
tabasco
table
--
2) Combine these words to produce n-tupl... |
|
Mem5 |
hashcat
|
2 |
465 |
07-28-2020, 12:47 PM |
|
|
Thread: My first bruteforce attack
Post: RE: My first bruteforce attack
unknow Wrote: (05-31-2013, 04:42 PM)
--
.. but there is an error. What's wrong?
--
Paste the error ! We can't guess it. |
|
Mem5 |
General Help
|
5 |
14,391 |
05-31-2013, 04:53 PM |
|
|
Thread: multi hccaps?
Post: RE: multi hccaps?
Not possible for the moment, because each hccap has a different ESSID.
Set only one hccap file. |
|
Mem5 |
Very old oclHashcat-plus Support
|
11 |
26,624 |
03-19-2013, 09:21 AM |
|
|
Thread: mssql 2005 cant crack easiest password (123)
Post: RE: mssql 2005 cant crack easiest password (123)
Try with an example hash ( https://hashcat.net/wiki/doku.php?id=example_hashes )
0x010018102152f8f28c8499d8ef263c53f8be369d799f931b2fbe
password is hashcat |
|
Mem5 |
hashcat
|
2 |
1,661 |
01-25-2019, 08:58 AM |
|
|
Thread: mscash2 - can't find password in dictionary
Post: RE: mscash2 - can't find password in dictionary
jacobsh Wrote: (12-17-2018, 11:52 PM)
--
EDIT: Seems like a deliberate limitation: https://www.notsosecure.com/maximum-password-length-reached/
--
It's a article from 2013, and using an old version ... |
|
Mem5 |
hashcat
|
3 |
2,346 |
12-18-2018, 10:17 AM |
|
|
Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption
"few minutes" ? Are you sure ? It take 10 hours on my 1080.
Using
Code:
--
hashcat64.exe -m 9700 --keep-guessing -a 3 hash.txt ?a?a?a?a?a?a
--
Am I doing something wrong? |
|
Mem5 |
General Talk
|
9 |
15,352 |
08-20-2017, 08:47 PM |
|
|
Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption
philsmd Wrote: (08-21-2017, 08:58 AM)
--
because you probably should use the collider mode 9710 (with mask ?b?b?b?b?b) for instant access to the data
--
Back to my tests, I have a oldoffice "type 1"... |
|
Mem5 |
General Talk
|
9 |
15,352 |
09-11-2017, 09:37 PM |
|
|
Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption
Thanks philsmd for this explanation.
But as I said before (I hope) I am looking for "a" password - not necessarily the original one - just one working password for forensics as you quote it.
That's ... |
|
Mem5 |
General Talk
|
9 |
15,352 |
09-19-2017, 09:38 PM |
|
|
Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption
|
Mem5 |
General Talk
|
9 |
15,352 |
07-15-2018, 10:24 PM |
|
|
Thread: MS Office 2019 hashes
Post: RE: MS Office 2019 hashes
|
Mem5 |
General Talk
|
2 |
2,622 |
11-15-2018, 01:27 AM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
Any reason to not support it ? All other modes have the username implementation.
I guess this is a Feature Request for github :) |
|
Mem5 |
hashcat
|
10 |
3,159 |
01-18-2020, 02:36 PM |
|
|
Thread: Mode 22000 Bad file descriptor
Post: RE: Mode 22000 Bad file descriptor
Ok. Legacy.. :)
Mode 16800 does support --username as it's only hex. That's why I thought mode 22000 (hex as well) would support it as well.
Anyway thanks for your common work to merge 16800 and 2500 ... |
|
Mem5 |
hashcat
|
10 |
3,159 |
01-18-2020, 02:57 PM |