Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: Cracking Excel Sheet Protection Passwords
Post: RE: Cracking Excel Sheet Protection Passwords

https://hashcat.net/wiki/doku.php?id=example_hashes Make sure that your hash is formed liked the example one (-m 25300), and you should be fine.
Banaanhangwagen hashcat 6 2,873 07-12-2023, 01:24 PM
    Thread: Hash Mode 7100 Hashes
Post: RE: Hash Mode 7100 Hashes

Since you have access to the raw files, I would consider attacking the Keychain as a faster solution. Seer: https://github.com/hashcat/hashcat/issues/2457#issuecomment-645363447
Banaanhangwagen hashcat 3 1,255 07-05-2023, 08:34 AM
    Thread: How would I go on getting hashes from a Windows 10 Online account?
Post: RE: How would I go on getting hashes from a Window...

This question has been asked already several times. A nice tool for recovering NTLM hashes (including online accounts) would be https://github.com/fortra/impacket/blob/master/examples/secretsdump.py
Banaanhangwagen General Talk 4 2,543 05-09-2023, 04:30 PM
    Thread: Access denied to SOFTWARE, SYSTEM etc.. Trying to find PIN
Post: RE: Access denied to SOFTWARE, SYSTEM etc.. Trying...

I have difficulties to follow your explanation... Either way, if you have the hash in your potfile, make sure to check the end of it - everything after the last ":" is the found pass
Banaanhangwagen hashcat 9 3,288 05-06-2023, 11:56 PM
    Thread: Access denied to SOFTWARE, SYSTEM etc.. Trying to find PIN
Post: RE: Access denied to SOFTWARE, SYSTEM etc.. Trying...

If the "recovered" line mentions 1/1, you'll have to double-check the potfile. Simply open it with Notepad for example.
Banaanhangwagen hashcat 9 3,288 05-04-2023, 10:32 PM
    Thread: Access denied to SOFTWARE, SYSTEM etc.. Trying to find PIN
Post: RE: Access denied to SOFTWARE, SYSTEM etc.. Trying...

The registry hives on a running machine are in use and locked. You'll need to copy them first. An easy way to do this is via CMD as admin: Code: -- reg save hklm\system c:\system.dump reg save hkl...
Banaanhangwagen hashcat 9 3,288 05-03-2023, 11:18 AM
    Thread: WINHELLO2hashcat
Post: RE: WINHELLO2hashcat

As you can read in the first post, this tool only does the PIN. If you want to crack the password-hash, you need an other tool for extracting the NTLM (for example secretsdump https://github.com/fort...
Banaanhangwagen User Contributions 15 33,508 02-28-2023, 12:55 PM
    Thread: Problem with special characters in mask
Post: RE: Problem with special characters in mask

Put your custom mask between double quotes. As for "?", you need to double it. As for double-quote-character itself, you need to put it at the end. Finally, remark that the ยง is not an ASCII char...
Banaanhangwagen hashcat 1 2,308 01-29-2023, 12:21 AM
    Thread: RAR5 Separator unmatched
Post: RE: RAR5 Separator unmatched

I see that the file containing the hash is "RAR.CRACK.txt". However, in your command you only write "RAR.CRACK"
Banaanhangwagen hashcat 4 3,449 01-26-2023, 02:46 PM
    Thread: Not Getting Value From Dictionary
Post: RE: Not Getting Value From Dictionary

Maybe you'll find a lead here ... https://hashcat.net/forum/thread-11246.html
Banaanhangwagen hashcat 1 1,904 01-26-2023, 10:58 AM
    Thread: dcc2 not work on optimized kernel
Post: RE: dcc2 not work on optimized kernel

As you can read in the output... Code: -- Kernel /home/hashcat/OpenCL/m02100-optimized.cl: Optimized kernel requested, but not available or not required Falling back to pure kernel --
Banaanhangwagen hashcat 3 3,113 01-26-2023, 10:54 AM
    Thread: RAR5 Separator unmatched
Post: RE: RAR5 Separator unmatched

Double-check your hash in the file RAR.crack. Is it correctly formatted ? Typos ? Also, you could try your command with the hash itself nicely between double quotes ("HASH").
Banaanhangwagen hashcat 4 3,449 01-26-2023, 10:42 AM
    Thread: tools/scripts recommendation for extracting hashes from SAM/SYSTEM
Post: RE: tools/scripts recommendation for extracting ha...

https://github.com/fortra/impacket/blob/master/examples/secretsdump.py
Banaanhangwagen hashcat 3 3,177 12-20-2022, 11:48 PM
    Thread: hashcat and enigma rotor calculation
Post: RE: hashcat and enigma rotor calculation

Hashcat does not support Enigma. I think that you want to look over here: https://github.com/the-lambda-way/bruteforce-enigma Or play around with the Enigma-plugin on Cyberchef : https://gchq.github...
Banaanhangwagen General Talk 3 3,258 12-10-2022, 12:13 PM
    Thread: Anyway I can crack a linux mint password?
Post: RE: Anyway I can crack a linux mint password?

You need to crack the hash typically stored in /etc/shadow. Find it, compare and format it as described here https://hashcat.net/wiki/doku.php?id=example_hashes, and finally try to crack it with Has...
Banaanhangwagen hashcat 2 2,483 12-10-2022, 12:05 PM
    Thread: Using less than 8 Characters on 22000
Post: RE: Using less than 8 Characters on 22000

A possibility could be generate your candidates with another Hashcat instance (using --stdout), and pipe them into your command.
Banaanhangwagen hashcat 5 5,014 11-04-2022, 11:47 AM
    Thread: Sha1DASH
Post: RE: Sha1DASH

Did you try the search function on this forum ? The first result gives you this : https://hashcat.net/forum/thread-9143.html In short: when using -m 120, the salt needs to be prepended and appende...
Banaanhangwagen hashcat 3 3,010 10-16-2022, 10:58 AM
    Thread: What's the point of a Mask?
Post: RE: What's the point of a Mask?

You use the attack-mode "-a 3", which expects a mask. You specify your mask by typing 18 times ?d in your command, so you give the instruction to Hashcat to use a 18-long-digits mask. Now, since you...
Banaanhangwagen hashcat 2 4,203 10-15-2022, 12:15 PM
    Thread: How Can i use "--stdout" with masks ?
Post: RE: How Can i use "--stdout" with masks ?

A quick view in the "--help" or here https://hashcat.net/wiki/doku.php?id=hashcat, will learn you that the mask "?h" is for hex-characters only. Use the other built-in charsets, and you'll do fine.
Banaanhangwagen hashcat 2 2,821 10-07-2022, 09:21 AM
    Thread: Veracrypt cracking
Post: RE: Veracrypt cracking

In order to crack the password of a Veracrypt-container, you have two possibilities: - recover the first 512 bytes of the container and use it as a "hash"; next, select the correct Veracrypt-'legac...
Banaanhangwagen hashcat 4 8,147 08-31-2022, 10:44 AM