Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Decoding Truecrypt problem
Post: RE: Decoding Truecrypt problem
1: yes, if it can crack in 6211, it can also be cracked with 6212 and 6313. This is true for all Truecrypt and veracrypt modes, that if you use a mode 3 - xts 1536 - it will also encounter xts 512 and... |
|
b8vr |
hashcat
|
3 |
2,616 |
05-24-2025, 01:35 AM |
|
|
Thread: Decoding Truecrypt problem
Post: RE: Decoding Truecrypt problem
Bartholomew Wrote: (05-19-2025, 01:40 PM)
--
Hello. I encrypted a pendrive partition (NTFS) Truecrypt version 7.1 I used the RIPEMD-160 hash key and AES encryption. (standard). I checked the non-syst... |
|
b8vr |
hashcat
|
3 |
2,616 |
05-20-2025, 12:11 AM |
|
|
Thread: Unable to crack hashes - "Failed to parse hashes using the native hashcat format"
Post: RE: Unable to crack hashes - "Failed to parse hash...
Then you need to check the file containing the hashes.
Username:hash where the hash is exactly 32 bytes long containing only 0-9a-f. |
|
b8vr |
hashcat
|
4 |
3,063 |
05-06-2025, 08:37 AM |
|
|
Thread: Unable to crack hashes - "Failed to parse hashes using the native hashcat format"
Post: RE: Unable to crack hashes - "Failed to parse hash...
The command will not crack anything:
hashcat -a 0 -m 1000 --username 1 .\hashes.txt --show .\stockpwd.txt
--username does not have any values, so hashcat thinks that the 1 is a hash. Remove the ... |
|
b8vr |
hashcat
|
4 |
3,063 |
05-06-2025, 07:57 AM |
|
|
Thread: how to do this auto
Post: RE: how to do this auto
That's not the point of hashcat. But just use chatgpt, that can quickly create a script for you. |
|
b8vr |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
5,646 |
04-09-2025, 04:02 PM |
|
|
Thread: How to add repetition of the same letter combination on a mask?
Post: RE: How to add repetition of the same letter combi...
ecomorph Wrote: (04-05-2025, 09:10 PM)
--
Hello, I would like to generate passwords that follow this pattern
_9
which would generate (skipping AAAaaa... and other repetitive permutations)
ABC... |
|
b8vr |
hashcat
|
1 |
2,256 |
04-07-2025, 05:40 PM |
|
|
Thread: how to do this auto
Post: RE: how to do this auto
You can't use hashcat for that. Just make a python script instead.
But, what you're trying to achieve is almost impossible.
The keyspace is huge. 256^32. That will take eons. Litterally. You wouldn't ... |
|
b8vr |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
5,646 |
04-03-2025, 08:32 AM |
|
|
Thread: Instead of launching a brute force attack on the video card, the processor is launche
Post: RE: Instead of launching a brute force attack on t...
Oh.... I see what you mean. I agree. |
|
b8vr |
hashcat
|
14 |
8,630 |
03-31-2025, 06:32 PM |
|
|
Thread: Instead of launching a brute force attack on the video card, the processor is launche
Post: RE: Instead of launching a brute force attack on t...
Did you install the cuda drivers from the nvidia website, https://developer.nvidia.com/cuda-downloads ?
Otherwise I would suggest reinstalling. |
|
b8vr |
hashcat
|
14 |
8,630 |
03-30-2025, 06:15 PM |
|
|
Thread: Instead of launching a brute force attack on the video card, the processor is launche
Post: RE: Instead of launching a brute force attack on t...
I'm not sure what you mean by -D2 == -d3, but can you post the output from hashcat -I |
|
b8vr |
hashcat
|
14 |
8,630 |
03-30-2025, 03:34 PM |
|
|
Thread: Instead of launching a brute force attack on the video card, the processor is launche
Post: RE: Instead of launching a brute force attack on t...
Try forcing it with uppercase -D2 |
|
b8vr |
hashcat
|
14 |
8,630 |
03-30-2025, 10:43 AM |
|
|
Thread: Need help to crack salted hash
Post: RE: Need help to crack salted hash
In that case you could use hashcat mode 1410 or 1420 depending on how you combine. One is hash: salt the other salt:hash |
|
b8vr |
hashcat
|
3 |
3,309 |
03-09-2025, 10:41 PM |
|
|
Thread: Need help to crack salted hash
Post: RE: Need help to crack salted hash
What type of hash?
I would use combinatorX to combine the hash and the salt into one file, containing salt:hash and then attack that with your wordlist. |
|
b8vr |
hashcat
|
3 |
3,309 |
03-09-2025, 05:24 PM |
|
|
Thread: If you specify a custom charset, you must also specify a mask
Post: RE: If you specify a custom charset, you must also...
First, your mask is wayyyyy to big. Hashcat will not accept that, plus it makes no sense. Second, your issue could be because you put "" around your mask. Don't do that.
Also, is it on purpose that... |
|
b8vr |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
6,153 |
02-09-2025, 12:03 AM |
|
|
Thread: Trying all case permutations for all alphabetical letters of a password?
Post: RE: Trying all case permutations for all alphabeti...
Firstly, doing any sort of mask attack on 24 characters is really not possible. Even on the fastest hash, that would take trillions of years. On passwords of that size, you need some really good wordl... |
|
b8vr |
hashcat
|
2 |
2,814 |
02-06-2025, 09:37 AM |
|
|
Thread: Truecrypt backup header?
Post: RE: Truecrypt backup header?
Looking at the format specs, it's not the last 512 bytes:
https://veracrypt.eu/en/VeraCrypt%20Volume%20Format%20Specification.html
The offset of the backup header is the size minus 131072 bytes.... |
|
b8vr |
hashcat
|
3 |
3,256 |
02-04-2025, 01:11 AM |
|
|
Thread: Truecrypt backup header?
Post: RE: Truecrypt backup header?
This is from the official documentation of veracrypt. I guess it also goes for older truecrypt. Not sure if your answer is here:
Note: For system encryption, there is no backup header at the end of t... |
|
b8vr |
hashcat
|
3 |
3,256 |
02-04-2025, 12:59 AM |
|
|
Thread: Doubts about RAR5 hash
Post: RE: Doubts about RAR5 hash
You need to remove the filename from the hashes. See example on https://hashcat.net/wiki/doku.php?id=example_hashes for correctly formed hashes. |
|
b8vr |
hashcat
|
1 |
2,131 |
02-03-2025, 01:20 AM |
|
|
Thread: Separator unmatched error
Post: RE: Separator unmatched error
No, the hash file does not need to be in the same folder. You just need to supply the correct path for it, eg. hashcat -m20 -a0 /path/to/hashfile.txt /path/to/wordlist.txt |
|
b8vr |
hashcat
|
4 |
3,805 |
02-03-2025, 01:13 AM |
|
|
Thread: Long unknown password lenght
Post: RE: Long unknown password lenght
You have to compile it yourself:
https://hashcat.net/forum/thread-11938.html |
|
b8vr |
hashcat
|
5 |
3,877 |
01-11-2025, 06:37 PM |