Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[desc]
|
|
|
Thread: Minimum password length
Post: Minimum password length
I know with hashcat I can specify a minimum password length, but I can't seem to find a similar option with oclhashcat. I'm working on a hybrid attack, and I've already brute forced everything with 7 ... |
|
rsberzerker |
Old oclHashcat Support
|
5 |
24,935 |
12-21-2014, 03:26 AM |
|
|
Thread: Minimum password length
Post: RE: Minimum password length
Yes, a mask will work for a brute force attack to select only certain length passwords, but it doesn't work for a hybrid attack. For example, my [fake, example only] dictionary contains two words: pas... |
|
rsberzerker |
Old oclHashcat Support
|
5 |
24,935 |
12-21-2014, 05:19 AM |
|
|
Thread: MD5 salted hashs
Post: MD5 salted hashs
I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5:salt hash elsewhere and put that, along with t... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 03:46 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
epixoip Wrote: (12-22-2014, 04:06 AM)
--
Not sure what you're doing wrong. Maybe you have trailing whitespace or something.
--
OK, partially solved. I did have some whitespace at the end of the has... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 04:48 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 07:18 AM |
|
|
Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: PCI-E 3.0 card in a PCI-E 2.0 mobo
My current motherboard has only a PCI-E 2.0 x16 slot. I'm more of a casual hashcracker, but want to upgrade my video card. I've looked around, and based on several parameters, I've found a nice one. B... |
|
rsberzerker |
Hardware
|
2 |
5,548 |
12-26-2014, 05:50 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Great tutorial. It would be better IMHO if you included two things:
1) A general explanation of what the princeprocessor is actually doing.
2) The equivalent named pipe for Windows.
Quote:
--
..... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,888 |
12-26-2014, 05:54 AM |
|
|
Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: RE: PCI-E 3.0 card in a PCI-E 2.0 mobo
Thanks for the quick reply. I guess I now know what my next VC will be. |
|
rsberzerker |
Hardware
|
2 |
5,548 |
12-26-2014, 06:10 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
atom Wrote: (12-26-2014, 01:14 PM)
--
It's described here https://hashcat.net/tools/princeprocessor/prince-attack.pdf
--
No quite as much detail as I hoped for, but more than I can [currently] under... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,888 |
12-27-2014, 06:03 AM |
|
|
Thread: save md5 generated hashes to the file ?
Post: RE: save md5 generated hashes to the file ?
undeath Wrote: (12-26-2014, 12:29 PM)
--
No. If you want to waste your space with rainbow tables go to freerainbowtables.com.
--
To add an example, ophcrack has a paid NTLM rainbow table of all pos... |
|
rsberzerker |
Old oclHashcat Support
|
2 |
5,356 |
12-27-2014, 07:38 AM |
|
|
Thread: Need some direction with combining dictionaries
Post: RE: Need some direction with combining dictionarie...
It can be done with oclhashcat, but it will take some work. You have two options (AFAIK):
1) Use the hashcat utility program combinator to create a new dictionary, then you can use rules with that.... |
|
rsberzerker |
Old oclHashcat Support
|
3 |
12,104 |
12-28-2014, 05:52 PM |
|
|
Thread: Is my plan a good idea?
Post: RE: Is my plan a good idea?
Rainbow tables are virtually useless against salted hashes. And even if they weren't, you have to factor in disk access times: How fast can you search those tables vs. how fast is hashcat (and oclhash... |
|
rsberzerker |
General Talk
|
23 |
40,648 |
12-28-2014, 11:28 PM |
|
|
Thread: Wordlists (Tips and Tricks)
Post: Wordlists (Tips and Tricks)
In another thread, epixoip posted this quote:
Quote:
--
...And remember, quality over quantity. Most wordlists you download from the Internet are going to be pure garbage...
--
This started a few ... |
|
rsberzerker |
General Talk
|
6 |
18,724 |
12-30-2014, 06:35 AM |
|
|
Thread: Wordlists (Tips and Tricks)
Post: RE: Wordlists (Tips and Tricks)
epixoip Wrote: (12-30-2014, 07:01 AM)
--
The context was around generating an hcstat file. Duplicates in your wordlist makes no sense.
--
That's what I thought. Just wanted to be sure I wasn't miss... |
|
rsberzerker |
General Talk
|
6 |
18,724 |
12-30-2014, 07:35 AM |
|
|
Thread: Wordlists (Tips and Tricks)
Post: RE: Wordlists (Tips and Tricks)
Saint Wrote: (12-30-2014, 01:41 PM)
--
I have made myself a ~800mb wordlist of all real passwords. It's a very nice addition to the hashes.org one which also contains only real passwords. If you want... |
|
rsberzerker |
General Talk
|
6 |
18,724 |
12-31-2014, 03:06 AM |
|
|
Thread: Incrementing Brute Force Attack?
Post: RE: Incrementing Brute Force Attack?
epixoip Wrote: (01-01-2015, 07:30 AM)
--
You're not going to be able to brute force past 9 characters, let alone 32.
--
Epixoip is right. True brute forcing past about 8 characters is not practical... |
|
rsberzerker |
Old oclHashcat Support
|
4 |
12,083 |
01-01-2015, 07:59 AM |
|
|
Thread: HashKiller - DDoS Problem
Post: RE: HashKiller - DDoS Problem
blandyuk Wrote: (01-03-2015, 03:42 PM)
--
OK, presume some of your have noticed www.hashkiller.co.uk and the forums are off-line right now. Reason is a DDoS against my IPs so I'm off until further no... |
|
rsberzerker |
General Talk
|
7 |
16,519 |
01-03-2015, 05:05 PM |
|
|
Thread: How can I extract rules from wordlists?
Post: RE: How can I extract rules from wordlists?
PACK (https://www.thesprawl.org/projects/pack/) has some tools that supposedly can do this. Only used it for mask generation (works great), but it can do rules. |
|
rsberzerker |
General Talk
|
7 |
12,214 |
01-04-2015, 05:56 AM |
|
|
Thread: How can I extract rules from wordlists?
Post: RE: How can I extract rules from wordlists?
Be sure you are using python 2.7. I tried 3.4 and it didn't work until I switched to 2.7. |
|
rsberzerker |
General Talk
|
7 |
12,214 |
01-04-2015, 02:48 PM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Been playing with Prince (0.19) and I noticed something strange. When using one list, it exhausts within seconds. Using a second list, it keeps going and going. Same command line, just the dictionary ... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,888 |
01-19-2015, 06:23 PM |