New with Hashcat - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: New with Hashcat (/thread-10286.html) Pages:
1
2
|
New with Hashcat - Alcanjp - 08-23-2021 Hello, I made a horrible mistake and I locked myself out of my disk. The password that generated by PASS was 10 Char to maybe 15 Char. example: .rAp/$J9=u Now I don't know what is the best approach for this is. Whether it is to generate a list of 1.000.000 10 CHAR then 11 and then 12 and ect And get lucky. Or is there a way to deal with this or should I simply wait for the years to come for a more powerful machine to come or give up entirely!! There was alot of stuff.... Thanks RE: New with Hashcat - Snoopy - 08-24-2021 what kind of disk? what kind of encryption? truecrypt, veracrypt, luks? the only way for truly random generated passwords is bruteforce or a maskattack, any ideas about the settings? most passwordgenerators have an option for dropping ambiguous chars like i l I or 0 o O for example RE: New with Hashcat - Alcanjp - 08-24-2021 (08-24-2021, 01:55 PM)Snoopy Wrote: what kind of disk? what kind of encryption? truecrypt, veracrypt, luks? Thank you for your response HD LUKS For the moment I have used passgen and created 10 character alphanumeric 10Millions running as we speak. RE: New with Hashcat - Alcanjp - 08-24-2021 (08-24-2021, 01:55 PM)Snoopy Wrote: what kind of disk? what kind of encryption? truecrypt, veracrypt, luks? However, I think I understand the goal of Maskattack and it would be to reduce time of cracking the password. But I don't know which slots needs to be manipulated. Right now I am purely guessing in the dark with what I remember of what that password is. RE: New with Hashcat - Snoopy - 08-24-2021 well hashcat could do this for you on the fly without any need for a premade wordlist bruteforce and mask-attack is more or less the same, you can use a masks like ?a?a?a?a?a?a?a?a?a?a to mimic plain bruteforce also you can tell hashcat to start with 10 chars minimum, but luks is considerd slow and bruteforcing will be for sure not really sucesssful try running hashcat -b -m 14600 and see your guessing rate RE: New with Hashcat - Alcanjp - 08-24-2021 (08-24-2021, 06:33 PM)Snoopy Wrote: well hashcat could do this for you on the fly without any need for a premade wordlist I am currently running this hashcat64.bin -m 14600 -a 0 -w 3 LUKS_Partition.001 Dictionary.txt -o luks_password.txt Hash rate is at 75. If I make a cracking rig couldn't that augment my chance with a better video card? What is hashcat -b ? RE: New with Hashcat - Snoopy - 08-24-2021 hashcat -b is benchmark mode, you can "test" your hardware and see your expected maximum hashrate (this is always my first step to see how "good" my attack is performing try pausing your session and run hashcat -b -m 14600 -D 1,2 in a new shell, this will benchmark on both [D]evicetypes, GPU and CPU, see output for maximum hashrates RE: New with Hashcat - Alcanjp - 08-24-2021 (08-24-2021, 06:33 PM)Snoopy Wrote: well hashcat could do this for you on the fly without any need for a premade wordlist Also I believe that last character was the letter x or X how can I state that this letter needs to be present as the last character? btw thanks for your help. RE: New with Hashcat - Snoopy - 08-24-2021 there is more than one answer to this when using dictionary attack (as you are doing right now), you can combine your dictionary with rules, see https://hashcat.net/wiki/doku.php?id=rule_based_attack so in your case this would be a rule-file with just 2 rules $X $x this tells hashcat to append one upper X or lower x to each pw-candidate you are trying or when using mask-attack you can specify up to 4 different charset so -1 Xx and mask ?a?a?a?a?1 means 4 times all possible chars, 5th char only X or x EDIT: Hashmode: 14600 - LUKS (Iterations: 163044) Speed.#1.........: 3079 H/s (89.54ms) @ Accel:32 Loops:512 Thr:512 Vec:1 Speed.#2.........: 2833 H/s (44.74ms) @ Accel:8 Loops:1024 Thr:512 Vec:1 Speed.#5.........: 337 H/s (57.12ms) @ Accel:512 Loops:256 Thr:1 Vec:4 Speed.#*.........: 6249 H/s not a real cracking rig, but luks is just slow... RE: New with Hashcat - Alcanjp - 08-24-2021 (08-24-2021, 08:29 PM)Snoopy Wrote: there is more than one answer to this |