Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Cracking unusual format StaticWord-Reverse(Password)-StaticWord
Post: RE: Cracking unusual format StaticWord-Reverse(Pas...
Ah yeah, sorry, I wasn't clear. I don't know the password, so I'm trying a straight brute force of available key space in line with my rig's available power while I tried to sort out this other issue.... |
|
OqQCP78Bz |
hashcat
|
2 |
3,899 |
03-29-2022, 06:24 AM |
|
|
Thread: Example hash for DES 14000 does not crack correctly.
Post: RE: Example hash for DES 14000 does not crack corr...
Hey @chick3nman, did this ever end up getting posted as a github issue? Is there a link I can follow if so?
Thanks |
|
OqQCP78Bz |
hashcat
|
11 |
17,656 |
03-29-2022, 06:19 AM |
|
|
Thread: Cracking unusual format StaticWord-Reverse(Password)-StaticWord
Post: Cracking unusual format StaticWord-Reverse(Passwor...
Hi,
I have an unusual MD5 hash format to try and crack.
The hash is created by performing the following
md5(StaticWord + Reverse(Password) + StaticWord)
So I require a way to not only generate re... |
|
OqQCP78Bz |
hashcat
|
2 |
3,899 |
03-21-2022, 07:06 AM |
|
|
Thread: Example hash for DES 14000 does not crack correctly.
Post: RE: Example hash for DES 14000 does not crack corr...
Chick3nman Wrote: (03-02-2022, 05:30 PM)
--
Yeah, i think the issue here is being confused. The correct key does indeed crack the example. The core problem here is that not all valid collisions are p... |
|
OqQCP78Bz |
hashcat
|
11 |
17,656 |
03-03-2022, 03:38 AM |
|
|
Thread: Example hash for DES 14000 does not crack correctly.
Post: RE: Example hash for DES 14000 does not crack corr...
@v71221 Yeah, that's fine, if I knew part of the key I'm trying to break first, but it doesn't help with a straight brute force? |
|
OqQCP78Bz |
hashcat
|
11 |
17,656 |
03-02-2022, 10:27 AM |
|
|
Thread: Example hash for DES 14000 does not crack correctly.
Post: RE: Example hash for DES 14000 does not crack corr...
@v71221 I have re-run the same command with v6.2.5. The results are the same.
Code:
--
PS D:\hashcat-6.2.5> .\hashcat.exe -a 3 -m 14000 a28bc61d44bb815c:1172075784504605 ?1?1?1?1?1?1?1?1 -1 ?l?d ... |
|
OqQCP78Bz |
hashcat
|
11 |
17,656 |
03-02-2022, 08:04 AM |
|
|
Thread: Example hash for DES 14000 does not crack correctly.
Post: RE: Example hash for DES 14000 does not crack corr...
@chick3nman thanks for that, please let us know if there's any update.
@nick8606 As far as I understand it, it is expected that you get multiple valid cracks, but I would still expect that 'hashcat... |
|
OqQCP78Bz |
hashcat
|
11 |
17,656 |
03-02-2022, 05:05 AM |
|
|
Thread: Example hash for DES 14000 does not crack correctly.
Post: Example hash for DES 14000 does not crack correctl...
Hi all,
I am attempting to crack the DES mode 14000 hash (a28bc61d44bb815c:1172075784504605) from https://hashcat.net/wiki/doku.php?id=example_hashes
As per the wiki, the password is supposed t... |
|
OqQCP78Bz |
hashcat
|
11 |
17,656 |
03-02-2022, 03:40 AM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
Thanks greatly for your help undeath and philsmd.
Your time and help has been much appreciated! |
|
OqQCP78Bz |
hashcat
|
9 |
16,119 |
02-11-2019, 03:58 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
Okay cool.
After re-reading that with your comments above I think I understand.
So, this is expected behaviour and essentially, for what I want to do, there's little I can change to get it to go a... |
|
OqQCP78Bz |
hashcat
|
9 |
16,119 |
02-11-2019, 03:02 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
Okay. That would make sense if -a 6 was also going the same speed. Is there some other fundamental difference between -a 6 and -a 7 other than the side the mask is on?
I _do_ notice a substantial i... |
|
OqQCP78Bz |
hashcat
|
9 |
16,119 |
02-11-2019, 02:34 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...
Sorry undeath, I don't understand what portion of that is relevant.
Are you implying that a 15GB word list + mask isn't enough work for hashcat to utilize the GPUs?
I also don't understand why... |
|
OqQCP78Bz |
hashcat
|
9 |
16,119 |
02-11-2019, 12:48 PM |
|
|
Thread: Attack mode 6 and 7 give vastly different speeds
Post: Attack mode 6 and 7 give vastly different speeds
Hi all,
I'm using hashcat v5.1.0 with 2x GTX980Ti's and the latest nVidia drivers on windows 10 x64
I'm trying to use a ?a modifier on the left hand side of a word list and then a right hand sid... |
|
OqQCP78Bz |
hashcat
|
9 |
16,119 |
02-11-2019, 07:05 AM |