Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Cracking Excel Sheet Protection Passwords
Post: RE: Cracking Excel Sheet Protection Passwords
https://hashcat.net/wiki/doku.php?id=example_hashes
Make sure that your hash is formed liked the example one (-m 25300), and you should be fine. |
|
Banaanhangwagen |
hashcat
|
6 |
2,873 |
07-12-2023, 01:24 PM |
|
|
Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes
Since you have access to the raw files, I would consider attacking the Keychain as a faster solution.
Seer: https://github.com/hashcat/hashcat/issues/2457#issuecomment-645363447 |
|
Banaanhangwagen |
hashcat
|
3 |
1,255 |
07-05-2023, 08:34 AM |
|
|
Thread: How would I go on getting hashes from a Windows 10 Online account?
Post: RE: How would I go on getting hashes from a Window...
This question has been asked already several times.
A nice tool for recovering NTLM hashes (including online accounts) would be https://github.com/fortra/impacket/blob/master/examples/secretsdump.py |
|
Banaanhangwagen |
General Talk
|
4 |
2,543 |
05-09-2023, 04:30 PM |
|
|
Thread: Access denied to SOFTWARE, SYSTEM etc.. Trying to find PIN
Post: RE: Access denied to SOFTWARE, SYSTEM etc.. Trying...
I have difficulties to follow your explanation...
Either way, if you have the hash in your potfile, make sure to check the end of it - everything after the last ":" is the found pass |
|
Banaanhangwagen |
hashcat
|
9 |
3,288 |
05-06-2023, 11:56 PM |
|
|
Thread: Access denied to SOFTWARE, SYSTEM etc.. Trying to find PIN
Post: RE: Access denied to SOFTWARE, SYSTEM etc.. Trying...
If the "recovered" line mentions 1/1, you'll have to double-check the potfile.
Simply open it with Notepad for example. |
|
Banaanhangwagen |
hashcat
|
9 |
3,288 |
05-04-2023, 10:32 PM |
|
|
Thread: Access denied to SOFTWARE, SYSTEM etc.. Trying to find PIN
Post: RE: Access denied to SOFTWARE, SYSTEM etc.. Trying...
The registry hives on a running machine are in use and locked. You'll need to copy them first.
An easy way to do this is via CMD as admin:
Code:
--
reg save hklm\system c:\system.dump
reg save hkl... |
|
Banaanhangwagen |
hashcat
|
9 |
3,288 |
05-03-2023, 11:18 AM |
|
|
Thread: WINHELLO2hashcat
Post: RE: WINHELLO2hashcat
As you can read in the first post, this tool only does the PIN.
If you want to crack the password-hash, you need an other tool for extracting the NTLM (for example secretsdump https://github.com/fort... |
|
Banaanhangwagen |
User Contributions
|
15 |
33,508 |
02-28-2023, 12:55 PM |
|
|
Thread: Problem with special characters in mask
Post: RE: Problem with special characters in mask
Put your custom mask between double quotes.
As for "?", you need to double it.
As for double-quote-character itself, you need to put it at the end.
Finally, remark that the ยง is not an ASCII char... |
|
Banaanhangwagen |
hashcat
|
1 |
2,308 |
01-29-2023, 12:21 AM |
|
|
Thread: RAR5 Separator unmatched
Post: RE: RAR5 Separator unmatched
I see that the file containing the hash is "RAR.CRACK.txt".
However, in your command you only write "RAR.CRACK" |
|
Banaanhangwagen |
hashcat
|
4 |
3,449 |
01-26-2023, 02:46 PM |
|
|
Thread: Not Getting Value From Dictionary
Post: RE: Not Getting Value From Dictionary
Maybe you'll find a lead here ...
https://hashcat.net/forum/thread-11246.html |
|
Banaanhangwagen |
hashcat
|
1 |
1,904 |
01-26-2023, 10:58 AM |
|
|
Thread: dcc2 not work on optimized kernel
Post: RE: dcc2 not work on optimized kernel
As you can read in the output...
Code:
--
Kernel /home/hashcat/OpenCL/m02100-optimized.cl:
Optimized kernel requested, but not available or not required
Falling back to pure kernel
--
|
|
Banaanhangwagen |
hashcat
|
3 |
3,113 |
01-26-2023, 10:54 AM |
|
|
Thread: RAR5 Separator unmatched
Post: RE: RAR5 Separator unmatched
Double-check your hash in the file RAR.crack. Is it correctly formatted ? Typos ?
Also, you could try your command with the hash itself nicely between double quotes ("HASH"). |
|
Banaanhangwagen |
hashcat
|
4 |
3,449 |
01-26-2023, 10:42 AM |
|
|
Thread: tools/scripts recommendation for extracting hashes from SAM/SYSTEM
Post: RE: tools/scripts recommendation for extracting ha...
https://github.com/fortra/impacket/blob/master/examples/secretsdump.py |
|
Banaanhangwagen |
hashcat
|
3 |
3,177 |
12-20-2022, 11:48 PM |
|
|
Thread: hashcat and enigma rotor calculation
Post: RE: hashcat and enigma rotor calculation
Hashcat does not support Enigma.
I think that you want to look over here: https://github.com/the-lambda-way/bruteforce-enigma
Or play around with the Enigma-plugin on Cyberchef : https://gchq.github... |
|
Banaanhangwagen |
General Talk
|
3 |
3,258 |
12-10-2022, 12:13 PM |
|
|
Thread: Anyway I can crack a linux mint password?
Post: RE: Anyway I can crack a linux mint password?
You need to crack the hash typically stored in /etc/shadow.
Find it, compare and format it as described here https://hashcat.net/wiki/doku.php?id=example_hashes, and finally try to crack it with Has... |
|
Banaanhangwagen |
hashcat
|
2 |
2,483 |
12-10-2022, 12:05 PM |
|
|
Thread: Using less than 8 Characters on 22000
Post: RE: Using less than 8 Characters on 22000
A possibility could be generate your candidates with another Hashcat instance (using --stdout), and pipe them into your command. |
|
Banaanhangwagen |
hashcat
|
5 |
5,014 |
11-04-2022, 11:47 AM |
|
|
Thread: Sha1DASH
Post: RE: Sha1DASH
Did you try the search function on this forum ?
The first result gives you this : https://hashcat.net/forum/thread-9143.html
In short: when using -m 120, the salt needs to be prepended and appende... |
|
Banaanhangwagen |
hashcat
|
3 |
3,010 |
10-16-2022, 10:58 AM |
|
|
Thread: What's the point of a Mask?
Post: RE: What's the point of a Mask?
You use the attack-mode "-a 3", which expects a mask.
You specify your mask by typing 18 times ?d in your command, so you give the instruction to Hashcat to use a 18-long-digits mask.
Now, since you... |
|
Banaanhangwagen |
hashcat
|
2 |
4,203 |
10-15-2022, 12:15 PM |
|
|
Thread: How Can i use "--stdout" with masks ?
Post: RE: How Can i use "--stdout" with masks ?
A quick view in the "--help" or here https://hashcat.net/wiki/doku.php?id=hashcat, will learn you that the mask "?h" is for hex-characters only.
Use the other built-in charsets, and you'll do fine. |
|
Banaanhangwagen |
hashcat
|
2 |
2,821 |
10-07-2022, 09:21 AM |
|
|
Thread: Veracrypt cracking
Post: RE: Veracrypt cracking
In order to crack the password of a Veracrypt-container, you have two possibilities:
- recover the first 512 bytes of the container and use it as a "hash"; next, select the correct Veracrypt-'legac... |
|
Banaanhangwagen |
hashcat
|
4 |
8,147 |
08-31-2022, 10:44 AM |