Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Pantagrule, a really large last-resort ruleset
Post: RE: Pantagrule, a really large last-resort ruleset
undeath edit: removed completely unnecessary quote
Nice, thank you! It's certainly getting a lot out of the HIBP dataset I'm playing with.
(terrible pun though :) ) |
|
blacktraffic |
User Contributions
|
2 |
1,659 |
01-22-2020, 04:01 PM |
|
|
Thread: What to watch out for when running two instances of Hashcat at once?
Post: RE: What to watch out for when running two instanc...
royce Wrote: (01-18-2020, 02:42 AM)
--
I often run more than one simultaneously, either distributing load among GPUs, or else pausing one long-running job to run a short-running job. This is often ea... |
|
blacktraffic |
hashcat
|
8 |
2,339 |
01-21-2020, 09:43 AM |
|
|
Thread: Hashcat on VPS (CPU only)
Post: RE: Hashcat on VPS (CPU only)
undeath edit: removed completely useless and excessive quote
I have to add "--force" on mine to get it to run on Intel at all... but I don't have hc 3.3 to test with I'm afraid. |
|
blacktraffic |
hashcat
|
6 |
1,790 |
01-13-2020, 04:31 PM |
|
|
Thread: Hashcat gets exhausted too quickly, HELP!
Post: RE: Hashcat gets exhausted too quickly, HELP!
LackuJacku Wrote: (01-11-2020, 05:50 AM)
--
blacktraffic Wrote: (01-06-2020, 11:34 AM)
--
D'oh - "nsa" rules here https://github.com/NSAKEY/nsa-rules/blob/master/_NSAKEY.v2.dive.rule (https://githu... |
|
blacktraffic |
hashcat
|
6 |
2,211 |
01-13-2020, 01:14 PM |
|
|
Thread: Can this password type be brute forced?
Post: RE: Can this password type be brute forced?
[0-9a-zA-Z] is 26 * 2 + 10 = 62 possibilities. Let's call it 6 bits (64 possibilities) just to round to nearest.
Assuming the password is generated randomly (and I'm pretty sure KeePassX will be OK... |
|
blacktraffic |
General Talk
|
2 |
1,226 |
01-10-2020, 12:55 PM |
|
|
Thread: Can shannon entropy be used to optimize password carcking?
Post: RE: Can shannon entropy be used to optimize passwo...
Complexoctopus Wrote: (01-07-2020, 11:48 AM)
--
I am pretty sure 99% of passwords are not random so I'd imagine if hashcat had a mode in which it would not wast time on hashing random passwords crack... |
|
blacktraffic |
hashcat
|
3 |
1,374 |
01-07-2020, 02:11 PM |
|
|
Thread: Extracted hash from 7z archive and it is 4708 characters long, is that normal?
Post: RE: Extracted hash from 7z archive and it is 4708 ...
Complexoctopus Wrote: (01-06-2020, 02:41 PM)
--
blacktraffic Wrote: (01-06-2020, 02:24 PM)
--
Complexoctopus Wrote: (01-06-2020, 02:17 PM)
--
Example hash for 11600 is much smaller
I used 7z2has... |
|
blacktraffic |
hashcat
|
4 |
1,760 |
01-06-2020, 03:14 PM |
|
|
Thread: Extracted hash from 7z archive and it is 4708 characters long, is that normal?
Post: RE: Extracted hash from 7z archive and it is 4708 ...
Complexoctopus Wrote: (01-06-2020, 02:17 PM)
--
Example hash for 11600 is much smaller
I used 7z2hashcat
--
From memory, yes? the various zip file types can generate large input data. The main ... |
|
blacktraffic |
hashcat
|
4 |
1,760 |
01-06-2020, 02:24 PM |
|
|
Thread: personal wrapper script that got out of hand, 'hashcrack'
Post: personal wrapper script that got out of hand, 'has...
I don't know if this will be of any use to anyone, but I hacked it together to do some of the boring bits, like recognising what hash type a hash might be, running some unpacking scripts if needed, ch... |
|
blacktraffic |
User Contributions
|
1 |
1,217 |
01-06-2020, 12:11 PM |
|
|
Thread: Hashcat gets exhausted too quickly, HELP!
Post: RE: Hashcat gets exhausted too quickly, HELP!
D'oh - "nsa" rules here https://github.com/NSAKEY/nsa-rules/blob/master/_NSAKEY.v2.dive.rule (https://github.com/NSAKEY/nsa-rules/blob/master/_NSAKEY.v2.dive.rule) .
I also just literally finishe... |
|
blacktraffic |
hashcat
|
6 |
2,211 |
01-06-2020, 11:34 AM |
|
|
Thread: Hashcat gets exhausted too quickly, HELP!
Post: RE: Hashcat gets exhausted too quickly, HELP!
You should also use rules; MD5 is screamingly fast and you won't be using your graphics card to its full potential.
I'm a big fan of these wordlists -https://github.com/berzerk0/Probable-Wordlists... |
|
blacktraffic |
hashcat
|
6 |
2,211 |
01-06-2020, 11:30 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
philsmd Wrote: (01-03-2020, 11:48 AM)
--
The general idea is good @backtraffic... but ...
we really are trying hard to discourage the use of hardware without (good) cooling solutions here. so it'... |
|
blacktraffic |
hashcat
|
11 |
8,539 |
01-03-2020, 11:58 AM |
|
|
Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash
TurboMatt Wrote: (01-03-2020, 03:21 AM)
--
First and foremost, this is an ethical hack. Unfortunately we are in a situation where a co-worker has reset the AD credentials on a very important account.... |
|
blacktraffic |
hashcat
|
11 |
8,539 |
01-03-2020, 11:37 AM |
|
|
Thread: Cracking Couchbase Admin Password
Post: Cracking Couchbase Admin Password
Hi all,
I couldn't find this on google, so hopefully it might help someone else. BTW, this is a test hash generated on my machine and doesn't matter to anyone.
First, find config.dat on the serv... |
|
blacktraffic |
User Contributions
|
0 |
892 |
12-26-2019, 05:30 PM |