Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Custom brute-force attack
Post: RE: Custom brute-force attack
slyexe Wrote: (09-14-2022, 12:16 AM)
--
This cannot be done by hashcat, as mentioned it would require additional scripting. Hashcats purpose is to reverse hashes to their plaintext and not the other ... |
|
mika09 |
hashcat
|
5 |
8,864 |
09-14-2022, 12:56 AM |
|
|
Thread: Custom brute-force attack
Post: RE: Custom brute-force attack
nick8606 Wrote: (09-13-2022, 10:07 AM)
--
I suppose, this custom attack will require custom module.
Fortunately, hashcat has md5(md5($pass)) module with accessible sources. You can take it as a ba... |
|
mika09 |
hashcat
|
5 |
8,864 |
09-13-2022, 08:48 PM |
|
|
Thread: Custom brute-force attack
Post: Custom brute-force attack
I have this attack:
hashcat -a 3 -m 0 "hash.txt" ?a?a?a?a?a?a?a?a?a
But I don't want to test these masks. First, I want to convert them to MD5, then take only the first 20 characters and finally a... |
|
mika09 |
hashcat
|
5 |
8,864 |
09-13-2022, 06:52 AM |
|
|
Thread: make fail 23800
Post: RE: make fail 23800
I recommend you to uninstall all you have been done about hashcat, download from hashcat.net the last hashcat version and try to repeat the process. |
|
mika09 |
hashcat
|
1 |
3,895 |
07-07-2022, 09:28 PM |
|
|
Thread: PDF -m 10500, limited to 32 password lenght
Post: PDF -m 10500, limited to 32 password lenght
I want to crack a PDF with 38 characters password lenght (I know the lenght of the password). I have a dictionary that contains the password. The password hash have the header 4*4*128*-4*1*16, so I ha... |
|
mika09 |
hashcat
|
1 |
4,207 |
07-07-2022, 09:08 PM |