Search Results
|
Post |
Author
[desc]
|
Forum |
Replies |
Views |
Posted |
|
|
Thread: Command structure?
Post: RE: Command structure?
It's possible. You may have to quote the path if contains spaces and leave off the trailing backslash. Here's an example where C:\Users\username\Documents\wordlists is a directory containing multiple ... |
|
rsberzerker |
hashcat
|
2 |
3,419 |
09-21-2017, 02:11 PM |
|
|
Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR
1) What hash type are you trying to crack?
2) There are example hashes for pretty much every type in the wiki. Check ones you are getting an error with against the example. Does it look the same fo... |
|
rsberzerker |
hashcat
|
9 |
7,528 |
09-21-2017, 02:18 PM |
|
|
Thread: Minimum password length
Post: Minimum password length
I know with hashcat I can specify a minimum password length, but I can't seem to find a similar option with oclhashcat. I'm working on a hybrid attack, and I've already brute forced everything with 7 ... |
|
rsberzerker |
Old oclHashcat Support
|
5 |
24,935 |
12-21-2014, 03:26 AM |
|
|
Thread: Minimum password length
Post: RE: Minimum password length
Yes, a mask will work for a brute force attack to select only certain length passwords, but it doesn't work for a hybrid attack. For example, my [fake, example only] dictionary contains two words: pas... |
|
rsberzerker |
Old oclHashcat Support
|
5 |
24,935 |
12-21-2014, 05:19 AM |
|
|
Thread: MD5 salted hashs
Post: MD5 salted hashs
I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5:salt hash elsewhere and put that, along with t... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 03:46 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
epixoip Wrote: (12-22-2014, 04:06 AM)
--
Not sure what you're doing wrong. Maybe you have trailing whitespace or something.
--
OK, partially solved. I did have some whitespace at the end of the has... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 04:48 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 07:18 AM |
|
|
Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: PCI-E 3.0 card in a PCI-E 2.0 mobo
My current motherboard has only a PCI-E 2.0 x16 slot. I'm more of a casual hashcracker, but want to upgrade my video card. I've looked around, and based on several parameters, I've found a nice one. B... |
|
rsberzerker |
Hardware
|
2 |
5,548 |
12-26-2014, 05:50 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Great tutorial. It would be better IMHO if you included two things:
1) A general explanation of what the princeprocessor is actually doing.
2) The equivalent named pipe for Windows.
Quote:
--
..... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,888 |
12-26-2014, 05:54 AM |
|
|
Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: RE: PCI-E 3.0 card in a PCI-E 2.0 mobo
Thanks for the quick reply. I guess I now know what my next VC will be. |
|
rsberzerker |
Hardware
|
2 |
5,548 |
12-26-2014, 06:10 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
atom Wrote: (12-26-2014, 01:14 PM)
--
It's described here https://hashcat.net/tools/princeprocessor/prince-attack.pdf
--
No quite as much detail as I hoped for, but more than I can [currently] under... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,888 |
12-27-2014, 06:03 AM |
|
|
Thread: save md5 generated hashes to the file ?
Post: RE: save md5 generated hashes to the file ?
undeath Wrote: (12-26-2014, 12:29 PM)
--
No. If you want to waste your space with rainbow tables go to freerainbowtables.com.
--
To add an example, ophcrack has a paid NTLM rainbow table of all pos... |
|
rsberzerker |
Old oclHashcat Support
|
2 |
5,356 |
12-27-2014, 07:38 AM |
|
|
Thread: Need some direction with combining dictionaries
Post: RE: Need some direction with combining dictionarie...
It can be done with oclhashcat, but it will take some work. You have two options (AFAIK):
1) Use the hashcat utility program combinator to create a new dictionary, then you can use rules with that.... |
|
rsberzerker |
Old oclHashcat Support
|
3 |
12,104 |
12-28-2014, 05:52 PM |
|
|
Thread: Is my plan a good idea?
Post: RE: Is my plan a good idea?
Rainbow tables are virtually useless against salted hashes. And even if they weren't, you have to factor in disk access times: How fast can you search those tables vs. how fast is hashcat (and oclhash... |
|
rsberzerker |
General Talk
|
23 |
40,648 |
12-28-2014, 11:28 PM |
|
|
Thread: Wordlists (Tips and Tricks)
Post: Wordlists (Tips and Tricks)
In another thread, epixoip posted this quote:
Quote:
--
...And remember, quality over quantity. Most wordlists you download from the Internet are going to be pure garbage...
--
This started a few ... |
|
rsberzerker |
General Talk
|
6 |
18,724 |
12-30-2014, 06:35 AM |
|
|
Thread: Wordlists (Tips and Tricks)
Post: RE: Wordlists (Tips and Tricks)
epixoip Wrote: (12-30-2014, 07:01 AM)
--
The context was around generating an hcstat file. Duplicates in your wordlist makes no sense.
--
That's what I thought. Just wanted to be sure I wasn't miss... |
|
rsberzerker |
General Talk
|
6 |
18,724 |
12-30-2014, 07:35 AM |
|
|
Thread: Wordlists (Tips and Tricks)
Post: RE: Wordlists (Tips and Tricks)
Saint Wrote: (12-30-2014, 01:41 PM)
--
I have made myself a ~800mb wordlist of all real passwords. It's a very nice addition to the hashes.org one which also contains only real passwords. If you want... |
|
rsberzerker |
General Talk
|
6 |
18,724 |
12-31-2014, 03:06 AM |
|
|
Thread: Incrementing Brute Force Attack?
Post: RE: Incrementing Brute Force Attack?
epixoip Wrote: (01-01-2015, 07:30 AM)
--
You're not going to be able to brute force past 9 characters, let alone 32.
--
Epixoip is right. True brute forcing past about 8 characters is not practical... |
|
rsberzerker |
Old oclHashcat Support
|
4 |
12,083 |
01-01-2015, 07:59 AM |
|
|
Thread: HashKiller - DDoS Problem
Post: RE: HashKiller - DDoS Problem
blandyuk Wrote: (01-03-2015, 03:42 PM)
--
OK, presume some of your have noticed www.hashkiller.co.uk and the forums are off-line right now. Reason is a DDoS against my IPs so I'm off until further no... |
|
rsberzerker |
General Talk
|
7 |
16,519 |
01-03-2015, 05:05 PM |
|
|
Thread: How can I extract rules from wordlists?
Post: RE: How can I extract rules from wordlists?
PACK (https://www.thesprawl.org/projects/pack/) has some tools that supposedly can do this. Only used it for mask generation (works great), but it can do rules. |
|
rsberzerker |
General Talk
|
7 |
12,214 |
01-04-2015, 05:56 AM |