Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: Custom brute-force attack
Post: RE: Custom brute-force attack

slyexe Wrote: (09-14-2022, 12:16 AM) -- This cannot be done by hashcat, as mentioned it would require additional scripting. Hashcats purpose is to reverse hashes to their plaintext and not the other ...
mika09 hashcat 5 6,205 09-14-2022, 12:56 AM
    Thread: Custom brute-force attack
Post: RE: Custom brute-force attack

nick8606 Wrote: (09-13-2022, 10:07 AM) -- I suppose, this custom attack will require custom module. Fortunately, hashcat has md5(md5($pass)) module with accessible sources. You can take it as a ba...
mika09 hashcat 5 6,205 09-13-2022, 08:48 PM
    Thread: Custom brute-force attack
Post: Custom brute-force attack

I have this attack: hashcat -a 3 -m 0 "hash.txt" ?a?a?a?a?a?a?a?a?a But I don't want to test these masks. First, I want to convert them to MD5, then take only the first 20 characters and finally a...
mika09 hashcat 5 6,205 09-13-2022, 06:52 AM
    Thread: make fail 23800
Post: RE: make fail 23800

I recommend you to uninstall all you have been done about hashcat, download from hashcat.net the last hashcat version and try to repeat the process.
mika09 hashcat 1 2,910 07-07-2022, 09:28 PM
    Thread: PDF -m 10500, limited to 32 password lenght
Post: PDF -m 10500, limited to 32 password lenght

I want to crack a PDF with 38 characters password lenght (I know the lenght of the password). I have a dictionary that contains the password. The password hash have the header 4*4*128*-4*1*16, so I ha...
mika09 hashcat 1 3,081 07-07-2022, 09:08 PM