Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...

For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often.
Incisive Old oclHashcat Support 9 49,860 07-22-2014, 05:25 AM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...

It's still using the 0x200 identifier; I just double-checked.
Incisive General Talk 3 15,371 04-07-2014, 04:23 AM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...

If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes. The archived thread on SQL Server 2012 hashes is at: http://hashcat.net/foru...
Incisive General Talk 3 15,371 04-04-2014, 04:12 PM
    Thread: Workstation GPU support (NVIDIA Quadro, ATI FirePro)
Post: Workstation GPU support (NVIDIA Quadro, ATI FirePr...

I realize it's suboptimal, but work password auditing must be done on work supplied hardware, unfortunately - compliance with corporate standards trumps speed. As long as I can get similar or faster ...
Incisive Hardware 0 6,523 02-20-2014, 07:42 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 27,913 01-27-2014, 06:12 AM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 27,913 01-24-2014, 10:08 PM
    Thread: Creating a secure hash?
Post: RE: Creating a secure hash?

As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT. For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u...
Incisive General Talk 6 21,654 01-24-2014, 09:50 PM
    Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)

First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI! I'd like to suggest that once you're happy with the ...
Incisive General Talk 10 42,269 10-10-2013, 05:28 AM
    Thread: Why closed source?
Post: RE: Why closed source?

Personally, I would like to thank Atom and all the other contributors to Hashcat for continuing to offer it to the security community for free. That, in and of itself, is both very generous, and very...
Incisive General Talk 29 115,363 10-10-2013, 05:04 AM
    Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos

You can use Code: -- --outfile=Myfile.out --outfile-format=5 -- instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's...
Incisive General Talk 8 25,560 05-03-2013, 04:26 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th...
Incisive Very old oclHashcat-plus Support 4 15,524 04-19-2013, 12:32 PM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Mem5 Wrote: (04-19-2013, 07:51 AM) -- Ok, I'll open a TRAC. Thank you for your help. Curious question : how can somebody login into a system using a password with the null byte character ? As it i...
Incisive General Help 15 54,606 04-19-2013, 12:02 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ...
Incisive Very old oclHashcat-plus Support 4 15,524 04-18-2013, 04:30 AM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

First, let me say that this has been a great discussion, and I'd like to thank Atom for the choice to branch out into some of the more interesting formats that aren't pure hashes! Second, regarding...
Incisive Very old oclHashcat-plus Support 44 477,011 04-18-2013, 04:28 AM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...

I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes. Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,...
Incisive Very old oclHashcat-plus Support 4 15,524 04-17-2013, 05:10 AM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

jpgoldberg Wrote: (04-17-2013, 02:44 AM) -- Remember that unlike the passwords that 1Password saves for people, the Master Password has to be memorable and typable by humans. If one uses a diceware p...
Incisive Very old oclHashcat-plus Support 44 477,011 04-17-2013, 04:58 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Awesome job, philsmd!!! Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:...
Incisive General Help 15 54,606 04-15-2013, 06:12 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe...
Incisive General Help 15 54,606 04-14-2013, 05:37 AM
    Thread: Markov stats questions
Post: Markov stats questions

First, thank you for implementing Markov mode - even the default oclhashcat-plus 0.14 implementation gets may more hits in the first part of the keyspace than in the last. I have a few questions ab...
Incisive hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 10,640 04-10-2013, 03:33 PM
    Thread: status from gpu cracking?
Post: RE: status from gpu cracking?

First, you may be confusing the "lite" version with the "plus" version. lite is designed to operate on a single hash, fed in on the command line. plus is designed to operate on a file of hashes. He...
Incisive Very old oclHashcat-plus Support 8 34,350 04-05-2013, 01:10 AM