Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Rule based on dictionary file
Post: RE: Rule based on dictionary file
hashcat -m MODE -a 6 -i hashfile streets.txt ?d?d?d
hashcat -m MODE -a 6 hashfile names.txt 19?d?d
hashcat -m MODE -a 6 hashfile names.txt 20?d?d
https://hashcat.net/wiki/doku.php?id=hybrid_attac... |
|
buka |
hashcat
|
1 |
856 |
02-16-2024, 09:59 AM |
|
|
Thread: Non consitent rules behaviour. (Obviously nuby issue)
Post: RE: Non consitent rules behaviour. (Obviously nuby...
Can't reproduce. How many lines is the resulting file? |
|
buka |
hashcat
|
7 |
1,564 |
02-09-2024, 07:59 AM |
|
|
Thread: Non consitent rules behaviour. (Obviously nuby issue)
Post: RE: Non consitent rules behaviour. (Obviously nuby...
WallyZ Wrote: (02-09-2024, 07:24 AM)
--
The character "$" is never being appended with rule $$.
--
Works for me. What version of hashcat are you using? |
|
buka |
hashcat
|
7 |
1,564 |
02-09-2024, 07:37 AM |
|
|
Thread: Non consitent rules behaviour. (Obviously nuby issue)
Post: RE: Non consitent rules behaviour. (Obviously nuby...
Are you quite sure they aren't in the output file? Hashcat doesn't output candidates in the alphabetical order. |
|
buka |
hashcat
|
7 |
1,564 |
02-09-2024, 07:07 AM |
|
|
Thread: Hash Cracking Assignment - Given part of a password
Post: RE: Hash Cracking Assignment - Given part of a pas...
You can try Pass?b?brd. Or, perhaps, these two characters are multi-byte. Then you can try Pass?b?b?brd, Pass?b?b?b?brd etc. |
|
buka |
hashcat
|
1 |
708 |
01-31-2024, 12:23 PM |
|
|
Thread: Hashcat mask optimilization to break 10 character password
Post: RE: Hashcat mask optimilization to break 10 charac...
It'll take forever to crack it anyway. |
|
buka |
hashcat
|
1 |
2,761 |
11-07-2023, 10:49 AM |
|
|
Thread: Hashcat failed to break 8 character password on NVIDA A100 - what is the reason?
Post: RE: Hashcat failed to break 8 character password o...
myg Wrote: (10-02-2023, 09:40 AM)
--
BnGra1P*
411CD27141387751E972BF3874AA44BA
--
That's NTLM (-m 1000) and not MD5 (-m 0), so hashcat having failed is OK. |
|
buka |
hashcat
|
9 |
5,320 |
10-02-2023, 10:03 AM |
|
|
Thread: Hashcat failed to break 8 character password on NVIDA A100 - what is the reason?
Post: RE: Hashcat failed to break 8 character password o...
The duplicate -a 3 shouldn't matter. What's the password? Does it contain any multi-byte characters? |
|
buka |
hashcat
|
9 |
5,320 |
10-02-2023, 09:03 AM |
|
|
Thread: -m 130 This format don't works with files!
Post: RE: -m 130 This format don't works with files!
UTF-16, most probably. Use a proper text editor instead of `echo`. |
|
buka |
hashcat
|
6 |
3,536 |
09-30-2023, 07:11 AM |
|
|
Thread: 32 hours in and still nothing, Have I done something wrong here?
Post: RE: 32 hours in and still nothing, Have I done som...
8 is the minimum for WPA-PBKDF2 I think? So if the password is truly random, you won't be able to crack it. If it's not, you can try dictionary attacks (with or without rules). |
|
buka |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,715 |
07-27-2023, 08:14 PM |
|
|
Thread: 32 hours in and still nothing, Have I done something wrong here?
Post: RE: 32 hours in and still nothing, Have I done som...
No worries. It can take years. 9 characters is way too much to bruteforce for -m 22000. |
|
buka |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
4,715 |
07-27-2023, 06:23 PM |
|
|
Thread: Rehashing
Post: RE: Rehashing
It's not possible*, but John The Ripper has a dynamic format which is closer to what you want:
https://github.com/openwall/john/blob/bleeding-jumbo/doc/DYNAMIC
* Unless you code that yourself. |
|
buka |
hashcat
|
2 |
3,526 |
07-16-2023, 06:57 AM |
|
|
Thread: Restore and Loopback
Post: RE: Restore and Loopback
If you use a potfile, `--loopback` will pick the founds up and use them. Unless you also use `--remove`, I think.
https://github.com/hashcat/hashcat/blob/e61442da9ca37c0317bc96595048bae347ddd858/sr... |
|
buka |
hashcat
|
2 |
3,315 |
07-15-2023, 06:28 AM |
|
|
Thread: sha1(eMinor--$saltsha1(eMinor--$plaintext--})--})
Post: RE: sha1(eMinor--$saltsha1(eMinor--$plaintext--})-...
I have the optimized ones, but I see no point in giving them away for free, sorry. |
|
buka |
hashcat
|
12 |
10,440 |
07-08-2023, 09:21 PM |
|
|
Thread: sha1(eMinor--$saltsha1(eMinor--$plaintext--})--})
Post: RE: sha1(eMinor--$saltsha1(eMinor--$plaintext--})-...
It's a shame. I strongly suspect no one else would be interested in buying the kernels. |
|
buka |
hashcat
|
12 |
10,440 |
07-08-2023, 09:56 AM |
|
|
Thread: sha1(eMinor--$saltsha1(eMinor--$plaintext--})--})
Post: RE: sha1(eMinor--$saltsha1(eMinor--$plaintext--})-...
Those eMinor lists on hashes.com, are they yours? |
|
buka |
hashcat
|
12 |
10,440 |
07-07-2023, 01:51 PM |
|
|
Thread: dictionary generating with rules
Post: RE: dictionary generating with rules
It's a bug and it's been fixed. Until 6.2.7 is released, you can download and use a "nightly" binary:
https://github.com/hashcat/hashcat/actions/runs/5453210659
Or you can try 6.2.5 |
|
buka |
hashcat
|
2 |
3,394 |
07-05-2023, 08:01 PM |
|
|
Thread: mixalpha-mask attack
Post: RE: mixalpha-mask attack
> ?l?l?l?l?l?l?l?l
No. Replace these lowercase 'L's with ones.
> -1 abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
Or shorter, -1 ?l?u |
|
buka |
hashcat
|
2 |
2,755 |
07-01-2023, 12:33 PM |
|
|
Thread: two-three-four (2char + 3char + 4char) combination
Post: RE: two-three-four (2char + 3char + 4char) combin...
combinatorX from https://github.com/hashcat/hashcat-utils/ |
|
buka |
hashcat
|
1 |
1,942 |
06-28-2023, 03:28 PM |
|
|
Thread: Create rule to accomplish what i want
Post: RE: Create rule to accomplish what i want
|
buka |
hashcat
|
2 |
2,826 |
06-22-2023, 10:34 AM |