Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion
@pragmatic: Well done with the description :)
The reason why WPA2 handshakes are so slow is due to the computationally intensive task of calculating the PMK.
If I remember correct, per the speci... |
|
NeonFlash |
General Talk
|
11 |
51,112 |
11-14-2012, 05:48 AM |
|
|
Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion
You could post supporting benchmarks as well :)
It should be faster than an attack without precomputed PMKs but slower than a rainbow table attack on unsalted hashes like MD5. |
|
NeonFlash |
General Talk
|
11 |
51,112 |
11-14-2012, 07:47 AM |
|
|
Thread: 4-Way Handshake confusion
Post: RE: 4-Way Handshake confusion
Thank you for confirming with the benchmark results. |
|
NeonFlash |
General Talk
|
11 |
51,112 |
11-14-2012, 10:47 AM |
|
|
Thread: Large IPB list issue
Post: RE: Large IPB list issue
@M@LIK: How did you fix the issue?
I face the same problem while cracking a large list of IPB hashes with oclhashcat-plus.
Dictionary attack runs ok, but with rules, I get wrong statistics when I pr... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
15 |
38,222 |
06-28-2012, 09:37 AM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
Hello,
I face the same issue as well with VBulletin and IPB hashes.
I have the plaintexts for the hashes I am trying to crack with oclhashcat-plus v0.081 and even then it does not show the resul... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
13 |
30,288 |
05-21-2012, 12:15 PM |
|
|
Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?
@hashfixer: I tried a dictionary attack on multi VB hashes and multi IPB hashes. Both were successful.
However, I am interested to know if the hybrid attacks and the combined dictionary attacks worke... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
13 |
30,288 |
06-28-2012, 09:40 AM |
|
|
Thread: Restore File Questions
Post: Restore File Questions
hi,
I have a few questions about the recent feature added in oclHashcat-plus, the restore session feature.
1. If I start an attack with a session name "MD5" like this:
oclhashcat-plus32.exe -... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
5 |
25,157 |
02-17-2013, 04:38 AM |
|
|
Thread: Segmentation fault (core dump) on --show and --left
Post: RE: Segmentation fault (core dump) on --show and -...
Interesting thread. I would like to hear the details as well.
By the way, after the crash occurs, maybe you can check the dmesg output and check the last few lines with tail command?
If the crash is... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
24,110 |
10-14-2012, 07:46 PM |
|
|
Thread: Cracking Russian Passwords
Post: Cracking Russian Passwords
I am not sure how the unicode support works but this is weird.
MD5 Hash: 714d5bc5daad4412e118d1bfd0c7477b
plaintext: ьфдщн
I noticed this on one of the hash cracked list on a ... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
23,629 |
05-23-2012, 08:31 PM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Thanks for the replies :)
A few points worth noting. Check the MD5 Hash of ьфдщн on the following 2 sites:
https://md5-hash-online.waraxe.us/
https://www.miraclesalad.com/webtools/md5... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
23,629 |
05-24-2012, 04:33 AM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Can somebody try what I suggested above and post their results? |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
23,629 |
05-25-2012, 08:37 PM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Thank you, M@LIK.
Can you please post the output of oclhashcat-plus session while cracking this password like I did in my post?
Yes, my dictionary file is UTF-8 Encoded.
I am cracking it on W... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
23,629 |
05-26-2012, 05:21 AM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Thank you again.
I am looking into this. So, as I understand, oclhashcat-plus is not BOM aware. I believe it could be made? For instance, if you encounter the bytes (EF BB FF) in the stream then ig... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
23,629 |
05-26-2012, 06:16 AM |
|
|
Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords
Thanks M@LIK :)
[hr]
Notepad++ will do this too.
Encoding -> Convert to UTF-8 without BOM |
|
NeonFlash |
Very old oclHashcat-plus Support
|
11 |
23,629 |
05-26-2012, 08:58 AM |
|
|
Thread: IPB Multi Hash list issue with ATI Radeon 5xxx and 6xxx
Post: IPB Multi Hash list issue with ATI Radeon 5xxx and...
AMD has this site available where you can report issues with sufficient information so that they can reproduce the issue at their end.
https://www.amdsurveys.com/se.ashx?s=5A1E27D20B2F3EAC
I woul... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
4 |
22,656 |
06-28-2012, 10:04 AM |
|
|
Thread: IPB Multi Hash list issue with ATI Radeon 5xxx and 6xxx
Post: RE: IPB Multi Hash list issue with ATI Radeon 5xxx...
little hashcracking utility? lol, they should do a Google Search about this software and analyze the statistics first.
Anyway, this is sad to know about their support. However, oclhashcat-plus is a... |
|
NeonFlash |
Very old oclHashcat-plus Support
|
4 |
22,656 |
06-28-2012, 10:09 AM |
|
|
Thread: IPB Multi Hash list issue with ATI Radeon 5xxx and 6xxx
Post: RE: IPB Multi Hash list issue with ATI Radeon 5xxx...
Yes, they will start giving more importance to your "little hashcracking utility" once they know that the highest end GPUs are being purchased not by the regular PC Gamers but by the hash crackers :) |
|
NeonFlash |
Very old oclHashcat-plus Support
|
4 |
22,656 |
06-28-2012, 12:45 PM |
|
|
Thread: Slow speed values for DEScrypt crack
Post: RE: Slow speed values for DEScrypt crack
descrypt hashes are slow. even with OMP on a quad core processor, you will get around 30M c/s at max.
Expect the same from a Good GPU.
ATI HD 7970 should give you a better speed like around 83 Mhash... |
|
NeonFlash |
Very old oclHashcat-lite Support
|
7 |
16,574 |
07-31-2012, 03:34 AM |
|
|
Thread: no faster WPA2 cracking?
Post: RE: no faster WPA2 cracking?
has this weakness in SHA-1 algorithm been used to revise the kernels for various SHA1 based algorithms in the latest version of oclhashcat-plus?
I think a lot of algorithms which are supported by ocl... |
|
NeonFlash |
General Talk
|
7 |
16,154 |
01-06-2013, 03:47 PM |
|
|
Thread: no faster WPA2 cracking?
Post: RE: no faster WPA2 cracking?
@undeath: My question was whether the latest version of oclhashcat-plus exploits the weakness in SHA-1 which was not mentioned in atom's post in this thread, if that's what you are referring to.
@ato... |
|
NeonFlash |
General Talk
|
7 |
16,154 |
01-06-2013, 04:03 PM |