Search Results
|
Post |
Author |
Forum
[asc]
|
Replies |
Views |
Posted |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
I guess the idea was taken from Passcape's fingerprint attack (https://www.passcape.com/windows_password_recovery_fingerprint_attack)? |
|
justme |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,879 |
02-02-2015, 10:37 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
What's the difference then? |
|
justme |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,879 |
02-02-2015, 10:46 AM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
|
justme |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,879 |
02-04-2015, 05:37 PM |
|
|
Thread: Practical PRINCE: 1 CPU + 24 hours = 63% Linkedin hashes cracked, 100% automated
Post: RE: Practical PRINCE: 1 CPU + 24 hours = 63% Linke...
I wonder now how duplicates are handled in prince? For example, for a 4 char keyspace we have: abc+d == ab+cd == a+bcd, etc. |
|
justme |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
22 |
74,879 |
02-04-2015, 05:42 PM |
|
|
Thread: Windows 10 Online Account
Post: RE: Windows 10 Online Account
Sherlock12 Wrote: (05-16-2017, 08:50 PM)
--
I'm trying to extract hashes for a Windows 10 online account. As it authenticates to Microsoft servers, the hash is not stored in the SAM file. Sign in is ... |
|
justme |
hashcat
|
7 |
10,255 |
05-20-2017, 03:15 PM |
|
|
Thread: GTX 970 VRAM allocation bug
Post: RE: GTX 970 VRAM allocation bug
This 'feature' had already been on earlier cards. |
|
justme |
Hardware
|
2 |
5,570 |
02-02-2015, 10:42 AM |