Search Results
|
Post
[desc]
|
Author |
Forum |
Replies |
Views |
Posted |
|
|
Thread: kwprocessor route help
Post: RE: kwprocessor route help
OK, thanks Atom. Combinator it is. |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
2 |
3,165 |
08-28-2017, 03:12 PM |
|
|
Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR
1) What hash type are you trying to crack?
2) There are example hashes for pretty much every type in the wiki. Check ones you are getting an error with against the example. Does it look the same fo... |
|
rsberzerker |
hashcat
|
9 |
7,528 |
09-21-2017, 02:18 PM |
|
|
Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR
Comparing your problem hashes to the example hashes, they don't match in format, which is the problem.
For the 2611, you have XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:XXXXXXXXXXXXXXXXXXXXXXXXXXX wh... |
|
rsberzerker |
hashcat
|
9 |
7,528 |
09-27-2017, 02:10 PM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
epixoip Wrote: (12-22-2014, 04:06 AM)
--
Not sure what you're doing wrong. Maybe you have trailing whitespace or something.
--
OK, partially solved. I did have some whitespace at the end of the has... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 04:48 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 07:18 AM |
|
|
Thread: Minimum password length
Post: RE: Minimum password length
Yes, a mask will work for a brute force attack to select only certain length passwords, but it doesn't work for a hybrid attack. For example, my [fake, example only] dictionary contains two words: pas... |
|
rsberzerker |
Old oclHashcat Support
|
5 |
24,934 |
12-21-2014, 05:19 AM |
|
|
Thread: MS Office Instant decryption
Post: RE: MS Office Instant decryption
philsmd Wrote: (08-21-2017, 08:58 AM)
--
because you probably should use the collider mode 9710 (with mask ?b?b?b?b?b) for instant access to the data
--
Here's a post by Atom with a more detailed e... |
|
rsberzerker |
General Talk
|
9 |
15,342 |
08-26-2017, 07:57 AM |
|
|
Thread: Need Help | SHA256
Post: RE: Need Help | SHA256
Translation of epixoip's post: Your keyspace is too large for hashcat to handle, even the 64 bit version. There's not enough memory addresses. No you can't get more until an OS and hardware are made t... |
|
rsberzerker |
hashcat
|
5 |
4,893 |
08-14-2017, 02:37 PM |
|
|
Thread: Need some direction with combining dictionaries
Post: RE: Need some direction with combining dictionarie...
It can be done with oclhashcat, but it will take some work. You have two options (AFAIK):
1) Use the hashcat utility program combinator to create a new dictionary, then you can use rules with that.... |
|
rsberzerker |
Old oclHashcat Support
|
3 |
12,102 |
12-28-2014, 05:52 PM |
|
|
Thread: No Output of Cracked Hashes
Post: RE: No Output of Cracked Hashes
Generally, the plain wordlists don't crack many, if any, passwords. But combine them with rules and you are more likely to get something. The best64 ruleset, included with oclhashcat, is a good one. J... |
|
rsberzerker |
Old oclHashcat Support
|
10 |
12,485 |
02-09-2015, 03:26 AM |
|
|
Thread: No Output of Cracked Hashes
Post: RE: No Output of Cracked Hashes
There are several online hash generators. Try giving them a "password" and get the hash. Then be sure the password is the dictionary you are using to attack said hash. This way, you will get to see a ... |
|
rsberzerker |
Old oclHashcat Support
|
10 |
12,485 |
02-09-2015, 05:33 AM |
|
|
Thread: oclHashcat bruteforce
Post: RE: oclHashcat bruteforce
I'm a little late, but instead of -i you could use a file with masks instead. For the example above of 1-7, create a file with the following lines:
?a
?a?a
?a?a?a
?a?a?a?a
?a?a?a?a?a
?a?a?a?a?... |
|
rsberzerker |
Old oclHashcat Support
|
12 |
19,260 |
02-05-2015, 03:12 PM |
|
|
Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: RE: PCI-E 3.0 card in a PCI-E 2.0 mobo
Thanks for the quick reply. I guess I now know what my next VC will be. |
|
rsberzerker |
Hardware
|
2 |
5,548 |
12-26-2014, 06:10 AM |
|
|
Thread: Performance difference Win 7 vs Win 10?
Post: RE: Performance difference Win 7 vs Win 10?
I'm running a mask attack, from different points in the same hcmask file I generated using PACK. (I deleted some from one copy then started hashcat.) All the masks are 10 characters, not that that sho... |
|
rsberzerker |
hashcat
|
3 |
3,723 |
09-16-2017, 01:37 PM |
|
|
Thread: Performance difference Win 7 vs Win 10?
Post: RE: Performance difference Win 7 vs Win 10?
I've done some more experimenting and I'm convinced there are other factors that determine speed besides the video card and hash. When I upgraded my main cracking system to the 1060 card, I took my ol... |
|
rsberzerker |
hashcat
|
3 |
3,723 |
09-19-2017, 05:03 AM |
|
|
Thread: Plain Vmware image setup - anyone?
Post: RE: Plain Vmware image setup - anyone?
> but it would be easier to re-load Win 7, however, that of course kicks the counter and makes my current version no longer authorized, even if I could do it.
A little off topic but I once talked... |
|
rsberzerker |
hashcat
|
5 |
4,924 |
09-01-2017, 05:21 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Great tutorial. It would be better IMHO if you included two things:
1) A general explanation of what the princeprocessor is actually doing.
2) The equivalent named pipe for Windows.
Quote:
--
..... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,872 |
12-26-2014, 05:54 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
atom Wrote: (12-26-2014, 01:14 PM)
--
It's described here https://hashcat.net/tools/princeprocessor/prince-attack.pdf
--
No quite as much detail as I hoped for, but more than I can [currently] under... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,872 |
12-27-2014, 06:03 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
Been playing with Prince (0.19) and I noticed something strange. When using one list, it exhausts within seconds. Using a second list, it keeps going and going. Same command line, just the dictionary ... |
|
rsberzerker |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,872 |
01-19-2015, 06:23 PM |
|
|
Thread: Rule shortcut
Post: RE: Rule shortcut
epixoip Wrote: (04-10-2015, 05:29 AM)
--
the shortcut is to use a stream editor to generate the rule file for you.
for example if you have a list of domains called "domains.txt", you would use som... |
|
rsberzerker |
General Help
|
9 |
13,600 |
04-10-2015, 05:33 AM |