Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Dilemma…!
Post: RE: Dilemma…!
You need the pyenchant library/module. I never was able to get this working on Windows, but it was easy on [Debian] Linux.
Any you need to understand the attack method. Based on your first post, yo... |
|
rsberzerker |
hashcat
|
13 |
9,643 |
09-19-2017, 01:59 PM |
|
|
Thread: Command structure?
Post: RE: Command structure?
It's possible. You may have to quote the path if contains spaces and leave off the trailing backslash. Here's an example where C:\Users\username\Documents\wordlists is a directory containing multiple ... |
|
rsberzerker |
hashcat
|
2 |
3,419 |
09-21-2017, 02:11 PM |
|
|
Thread: Hashcat rule help.
Post: RE: Hashcat rule help.
There are several ways depending on what you are trying to accomplish:
1) Rules (see the wiki if you don't understand the line)
Code:
--
Insert @ N | iNX | Inserts character X at position N | i... |
|
rsberzerker |
hashcat
|
6 |
5,413 |
09-26-2017, 02:48 PM |
|
|
Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR
Comparing your problem hashes to the example hashes, they don't match in format, which is the problem.
For the 2611, you have XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:XXXXXXXXXXXXXXXXXXXXXXXXXXX wh... |
|
rsberzerker |
hashcat
|
9 |
7,528 |
09-27-2017, 02:10 PM |
|
|
Thread: 5 question around
Post: RE: 5 question around
2) Depends on the hashtype.
3) You are using the parameter --outfile-format 2
From the wiki:
Code:
--
- [ Outfile Formats ] -
# | Format
===+========
1 | hash[:salt]
2 | plain
�... |
|
rsberzerker |
hashcat
|
5 |
5,386 |
09-27-2017, 02:34 PM |
|
|
Thread: wpa2 broken
Post: RE: wpa2 broken
I'd guess no. This attack isn't a way to crack the actual password, but trick the endpoint into connecting to another device with a known password. |
|
rsberzerker |
hashcat
|
3 |
3,877 |
10-16-2017, 02:56 PM |
|
|
Thread: 5 question around
Post: RE: 5 question around
Some rule files are included with hashcat in the rules directory. Best64 is the name of one set of rules. Example command:
hashcat64.exe -m %hashtype% -a 0 --remove -o %outfile% --status --markov-... |
|
rsberzerker |
hashcat
|
5 |
5,386 |
09-28-2017, 03:39 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Great tutorial. It would be better IMHO if you included two things:
1) A general explanation of what the princeprocessor is actually doing.
2) The equivalent named pipe for Windows.
Quote:
--
..... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,872 |
12-26-2014, 05:54 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
atom Wrote: (12-26-2014, 01:14 PM)
--
It's described here https://hashcat.net/tools/princeprocessor/prince-attack.pdf
--
No quite as much detail as I hoped for, but more than I can [currently] under... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,872 |
12-27-2014, 06:03 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Been playing with Prince (0.19) and I noticed something strange. When using one list, it exhausts within seconds. Using a second list, it keeps going and going. Same command line, just the dictionary ... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,872 |
01-19-2015, 06:23 PM |
|
|
Thread: kwprocessor route help
Post: kwprocessor route help
I've been playing around with kwprocessor and so far been unable to get it to generate a password [pattern] I know a friend uses. The pattern is a walk down 4, then start at the top again with a shift... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
3,165 |
08-27-2017, 05:57 AM |
|
|
Thread: kwprocessor route help
Post: RE: kwprocessor route help
OK, thanks Atom. Combinator it is. |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
3,165 |
08-28-2017, 03:12 PM |
|
|
Thread: *processor restore
Post: *processor restore
When using one of the processors (statprocessor in my case), I pipe it to hashcat. But unlike a normal wordlist/mask, there is no built-in save/restore. The wiki states to use -s, --skip=NUM s... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
3,067 |
08-29-2017, 05:39 PM |
|
|
Thread: *processor restore
Post: RE: *processor restore
I meant the skip to be used in the *processor command, not hashcat, but is the number to give the *processor the progress number from the hashcat status when using rules? |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
3,067 |
08-31-2017, 01:30 PM |
|
|
Thread: MD5 salted hashs
Post: MD5 salted hashs
I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5:salt hash elsewhere and put that, along with t... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 03:46 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
epixoip Wrote: (12-22-2014, 04:06 AM)
--
Not sure what you're doing wrong. Maybe you have trailing whitespace or something.
--
OK, partially solved. I did have some whitespace at the end of the has... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 04:48 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 07:18 AM |
|
|
Thread: Is it even possible?
Post: RE: Is it even possible?
Well, the character set is 26+26 = 52. Ten characters is 52^10 = 144,555,105,949,057,024 possible passwords. At 10m/sec (which is very low depending on the hash), ~458 years.
BUT...10m/sec is low f... |
|
rsberzerker |
Old hashcat Support
|
11 |
16,222 |
02-08-2015, 09:19 PM |
|
|
Thread: Is it even possible?
Post: RE: Is it even possible?
If you have the hash, you should have the salt too. Hashcat (and oclhashcat), given the right -m parameter, will automatically use the salt. You don't need to crack that. |
|
rsberzerker |
Old hashcat Support
|
11 |
16,222 |
02-08-2015, 11:49 PM |
|
|
Thread: Is it even possible?
Post: RE: Is it even possible?
Yes. The salt is normally stored with the hash. So if you have access to the hash, you have access to the salt. |
|
rsberzerker |
Old hashcat Support
|
11 |
16,222 |
02-10-2015, 03:10 PM |