Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Multiple dictionary files in a folder
Post: Multiple dictionary files in a folder
Hello,
Is there an option in hashcat to run against a folder that contains multiple dictionaries/word lists?
Right now, the only way I seeĀ is to write a script that supplies to hashcat one word... |
|
ajaxdecbe |
hashcat
|
1 |
4,522 |
04-29-2018, 07:54 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
undeath Wrote: (04-25-2018, 05:59 PM)
--
you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4
Other than that the most time you can save b... |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-25-2018, 11:20 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
Guys,
Thanks for the quick responses. I was having a typo. The below syntax worked.
hashcat64 -a 3 -m 20 -O --hex-salt hash.txt ?a?a?a
-m 20 with mask was 5x faster than -m 0 with mask.
T... |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-25-2018, 05:32 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
undeath Wrote: (04-25-2018, 12:05 PM)
--
how did you create the hash?
--
with the md5 command on linux.
Is my hashcat syntax correct? |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-25-2018, 12:37 PM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
undeath Wrote: (04-25-2018, 11:26 AM)
--
yes, performance is better with m20 if you have a static prefix.
hash format is usually
Code:
--
hexhash:salt
--
--
hashcat64 -a 3 -m 20 -O --hex-salt ... |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-25-2018, 11:35 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
royce Wrote: (04-25-2018, 07:28 AM)
--
Regardless of attack, -m 0 is unsalted and -m 20 is salted. If this concept isn't familiar, search a bit for "password" and "salting".
--
Thanks. @royce.
I... |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-25-2018, 10:53 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
Guys, following up on this thread on my previous question. Can someone would be kind enough to tell the difference between -m 0 and -m 20 in a mask attack? |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-25-2018, 01:40 AM |
|
|
Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack
@royce & @philsmd
Thanks for your help. I was able to validate known password/hash matches with the below syntax. Trying now for the passwords that I don't know.
hashcat64 -a 3 -m 0 -O --hex-cha... |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-22-2018, 09:23 PM |
|
|
Thread: Using newline character as part of mask attack
Post: Using newline character as part of mask attack
I have a MD5 hash which is computed as follows.
hash = md5(username\npassword);
As you see there is a new line character (\n) between the username and password. I know the user name and trying t... |
|
ajaxdecbe |
hashcat
|
16 |
9,656 |
04-22-2018, 12:13 AM |