Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Rule shortcut
Post: RE: Rule shortcut
epixoip Wrote: (04-10-2015, 05:29 AM)
--
the shortcut is to use a stream editor to generate the rule file for you.
for example if you have a list of domains called "domains.txt", you would use som... |
|
rsberzerker |
General Help
|
9 |
13,600 |
04-10-2015, 05:33 AM |
|
|
Thread: Rule shortcut
Post: RE: Rule shortcut
epixoip Wrote: (04-13-2015, 05:17 AM)
--
Spaces are optional.
The rule isn't failing, it just isn't loading because it's too long to be used on GPU. It will work in hashcat-cli though.
--
What is t... |
|
rsberzerker |
General Help
|
9 |
13,600 |
04-13-2015, 05:26 AM |
|
|
Thread: Rule shortcut
Post: RE: Rule shortcut
I've been working with this and had the [maybe] bright idea to combine this with the best64 rules. It somewhat works, and has found some hashes even in it's current somewhat broken state. Some of the ... |
|
rsberzerker |
General Help
|
9 |
13,600 |
04-13-2015, 05:11 AM |
|
|
Thread: Rule shortcut
Post: RE: Rule shortcut
coolbry95 Wrote: (04-13-2015, 05:51 AM)
--
The limit is 15 functions per line. If you were to use a combinator attack you would do username domains -j '$@'.
--
Thanks. That explains why I get the ... |
|
rsberzerker |
General Help
|
9 |
13,600 |
04-13-2015, 06:11 AM |
|
|
Thread: HashCat t-shirt !
Post: RE: HashCat t-shirt !
At the very least, you can loose the = sign.
Loosing the "+ 4 GTX970" would make it less busy. Most people might understand the Hash with "password killer/analyzer", but the GTX970 would be lost on... |
|
rsberzerker |
User Contributions
|
7 |
13,400 |
04-13-2015, 06:42 AM |
|
|
Thread: No Output of Cracked Hashes
Post: RE: No Output of Cracked Hashes
Generally, the plain wordlists don't crack many, if any, passwords. But combine them with rules and you are more likely to get something. The best64 ruleset, included with oclhashcat, is a good one. J... |
|
rsberzerker |
Old oclHashcat Support
|
10 |
12,485 |
02-09-2015, 03:26 AM |
|
|
Thread: No Output of Cracked Hashes
Post: RE: No Output of Cracked Hashes
There are several online hash generators. Try giving them a "password" and get the hash. Then be sure the password is the dictionary you are using to attack said hash. This way, you will get to see a ... |
|
rsberzerker |
Old oclHashcat Support
|
10 |
12,485 |
02-09-2015, 05:33 AM |
|
|
Thread: How can I extract rules from wordlists?
Post: RE: How can I extract rules from wordlists?
PACK (https://www.thesprawl.org/projects/pack/) has some tools that supposedly can do this. Only used it for mask generation (works great), but it can do rules. |
|
rsberzerker |
General Talk
|
7 |
12,214 |
01-04-2015, 05:56 AM |
|
|
Thread: How can I extract rules from wordlists?
Post: RE: How can I extract rules from wordlists?
Be sure you are using python 2.7. I tried 3.4 and it didn't work until I switched to 2.7. |
|
rsberzerker |
General Talk
|
7 |
12,214 |
01-04-2015, 02:48 PM |
|
|
Thread: Need some direction with combining dictionaries
Post: RE: Need some direction with combining dictionarie...
It can be done with oclhashcat, but it will take some work. You have two options (AFAIK):
1) Use the hashcat utility program combinator to create a new dictionary, then you can use rules with that.... |
|
rsberzerker |
Old oclHashcat Support
|
3 |
12,102 |
12-28-2014, 05:52 PM |
|
|
Thread: Incrementing Brute Force Attack?
Post: RE: Incrementing Brute Force Attack?
epixoip Wrote: (01-01-2015, 07:30 AM)
--
You're not going to be able to brute force past 9 characters, let alone 32.
--
Epixoip is right. True brute forcing past about 8 characters is not practical... |
|
rsberzerker |
Old oclHashcat Support
|
4 |
12,081 |
01-01-2015, 07:59 AM |
|
|
Thread: Dilemma…!
Post: RE: Dilemma…!
undeath Wrote: (09-13-2017, 05:37 PM)
--
PACK is just a collection of python scripts. You can run python on almost any OS, including Windows.
--
In theory yes. In practice, there is a dependency wi... |
|
rsberzerker |
hashcat
|
13 |
9,643 |
09-18-2017, 02:12 PM |
|
|
Thread: Dilemma…!
Post: RE: Dilemma…!
You need the pyenchant library/module. I never was able to get this working on Windows, but it was easy on [Debian] Linux.
Any you need to understand the attack method. Based on your first post, yo... |
|
rsberzerker |
hashcat
|
13 |
9,643 |
09-19-2017, 01:59 PM |
|
|
Thread: MD5 salted hashs
Post: MD5 salted hashs
I've got [mostly] down how to use hashcat (and oclhashcat) on unsalted hashes, so I decided to try something harder, a salted hash. I found a cracked md5:salt hash elsewhere and put that, along with t... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 03:46 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
epixoip Wrote: (12-22-2014, 04:06 AM)
--
Not sure what you're doing wrong. Maybe you have trailing whitespace or something.
--
OK, partially solved. I did have some whitespace at the end of the has... |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 04:48 AM |
|
|
Thread: MD5 salted hashs
Post: RE: MD5 salted hashs
That's what I thought. Thanks. If nothing else, I think I finally truly understand salting (as opposed to just being able to define it). |
|
rsberzerker |
Old hashcat Support
|
4 |
8,165 |
12-22-2014, 07:18 AM |
|
|
Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR
1) What hash type are you trying to crack?
2) There are example hashes for pretty much every type in the wiki. Check ones you are getting an error with against the example. Does it look the same fo... |
|
rsberzerker |
hashcat
|
9 |
7,528 |
09-21-2017, 02:18 PM |
|
|
Thread: LINE/ENCODING ERROR
Post: RE: LINE/ENCODING ERROR
Comparing your problem hashes to the example hashes, they don't match in format, which is the problem.
For the 2611, you have XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX:XXXXXXXXXXXXXXXXXXXXXXXXXXX wh... |
|
rsberzerker |
hashcat
|
9 |
7,528 |
09-27-2017, 02:10 PM |
|
|
Thread: Checkpoint not working in latest version or me being a noob?
Post: RE: Checkpoint not working in latest version or me...
> If possible: For slow hashes try to hold the amplifier around 50-500 amplifier and for fast hashes 500-5000. Shift more data to the base than to the amplifier.
Atom: Is this a general rule or on... |
|
rsberzerker |
hashcat
|
6 |
6,005 |
09-23-2017, 04:19 PM |
|
|
Thread: PCI-E 3.0 card in a PCI-E 2.0 mobo
Post: PCI-E 3.0 card in a PCI-E 2.0 mobo
My current motherboard has only a PCI-E 2.0 x16 slot. I'm more of a casual hashcracker, but want to upgrade my video card. I've looked around, and based on several parameters, I've found a nice one. B... |
|
rsberzerker |
Hardware
|
2 |
5,548 |
12-26-2014, 05:50 AM |