Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: hascat plaintext mode (99999) with weakpass_3w list
Post: RE: hascat plaintext mode (99999) with weakpass_3w...
General diagnostic step: test a simpler case - a single word, with a single word in an uncompressed wordlist. Then try compressing the wordlist and see if it still works. |
|
royce |
hashcat
|
3 |
574 |
06-12-2022, 12:50 AM |
|
|
Thread: Help rar5 hash
Post: RE: Help rar5 hash
arkedia, your hash has been redacted. As per forum rules, do not request cracking or post hashes in the forums. |
|
royce |
hashcat
|
5 |
1,414 |
04-23-2022, 12:42 AM |
|
|
Thread: Keyspace List for WPA on Default Routers
Post: RE: Keyspace List for WPA on Default Routers
https://packetstormsecurity.com/files/166712/ZSL-2022-5701.txt
"The password is generated using the last 4 values from device's MAC address which is disclosed on the main webUI login page to an una... |
|
royce |
User Contributions
|
197 |
540,454 |
04-13-2022, 09:57 PM |
|
|
Thread: Recover password from FreeArc file
Post: RE: Recover password from FreeArc file
If an algorithm exists and is easy to implement in hashcat, then if it was rare, I can see the main developers not wanting to implement it themselves. But I would want to be open to accepting good PRs... |
|
royce |
hashcat
|
4 |
5,088 |
03-14-2022, 12:41 AM |
|
|
Thread: How to crack a bcrypt hash with salt?
Post: RE: How to crack a bcrypt hash with salt?
If the salt is already in the hash, it will automatically be used, for all hash types.
If the salt is not already in the hash, you can supply it on the command line. |
|
royce |
hashcat
|
3 |
2,432 |
03-02-2022, 09:45 AM |
|
|
Thread: How to crack a bcrypt hash with salt?
Post: RE: How to crack a bcrypt hash with salt?
hashcat detects and uses the salt automatically. Simply pass the hash it on the command line (may need to single-quote the dollar signs). It's mode 3200 (unless it's a nested hash of some kind). So ha... |
|
royce |
hashcat
|
3 |
2,432 |
03-02-2022, 12:38 AM |
|
|
Thread: Solar Powered Hascat - Checkpoint
Post: RE: Solar Powered Hascat - Checkpoint
There currently isn't a way to adjust hashcat's checkpoint interval. It is automatically calculated.
Your only other option would be to divide your attack into small attacks. |
|
royce |
hashcat
|
1 |
1,655 |
11-10-2021, 06:50 AM |
|
|
Thread: help me pls
Post: RE: help me pls
Based on the output you've shown above, the attack would work, but jus be slower.
Are you getting any other errors? |
|
royce |
hashcat
|
1 |
2,035 |
11-08-2021, 08:46 AM |
|
|
Thread: Mask-Attack
Post: RE: Mask-Attack
The links you listed illustrate how to do that. It's comma-separated and order-dependent, so these are equivalent:
cmdline:
-1 ?l?u ?1?1?1
file:
?l?u,?1?1?1
... and:
cmdline:
-1 ?l?u -2 ?u?d ?1?2?... |
|
royce |
hashcat
|
8 |
6,541 |
11-08-2021, 08:45 AM |
|
|
Thread: Invalid Device id 0 Specified
Post: RE: Invalid Device id 0 Specified
Not sure if it's related, but --depricted-check-disable has a typo in it |
|
royce |
hashcat
|
4 |
4,408 |
11-08-2021, 08:42 AM |
|
|
Thread: Sha255 with custom amount of iterations.
Post: RE: Sha255 with custom amount of iterations.
hashcat has no support for arbitrary iteration. MDXfind is the main option there, but it is (currently) only CPU, not GPU. |
|
royce |
General Talk
|
1 |
1,392 |
11-03-2021, 06:17 AM |
|
|
Thread: Getting salt from known hash and pass
Post: RE: Getting salt from known hash and pass
Yep - not to self-promote too much, but I answered it here:
https://security.stackexchange.com/a/171922/6203
The key concept is that the salt is actually part of the password, so you're trying to cr... |
|
royce |
hashcat
|
1 |
2,494 |
10-16-2021, 01:57 AM |
|
|
Thread: Wordlist form Weakpass - File Format
Post: RE: Wordlist form Weakpass - File Format
Your instincts are good. Yes, they should be rare - even historically, and pretty much non-existent for web-based passwords. Many "wordlists" are just massive mashups of other people's ideas of what m... |
|
royce |
General Talk
|
4 |
4,053 |
09-20-2021, 09:44 PM |
|
|
Thread: Running hashcat on multiple hash files
Post: RE: Running hashcat on multiple hash files
Agreed - I think the OP was motivated by convenience, not efficiency. :D |
|
royce |
General Talk
|
7 |
10,251 |
09-14-2021, 02:29 AM |
|
|
Thread: haveibeenpwned DB
Post: RE: haveibeenpwned DB
Strip the unneeded field before handing the hashlist to hashcat. |
|
royce |
hashcat
|
2 |
3,086 |
09-07-2021, 01:29 AM |
|
|
Thread: Adding teamspeak hash algorithm
Post: RE: Adding teamspeak hash algorithm
hashcat development has moved to GitHub - you can open an issue there.
https://github.com/hashcat/hashcat |
|
royce |
hashcat
|
2 |
2,476 |
08-29-2021, 08:27 AM |
|
|
Thread: Is there a program that generates statistics of cracked passwords with hashcat?
Post: RE: Is there a program that generates statistics o...
And its Rust cousin, PACK2 (fewer features at this writing, but has some cool ones that PACK does not, and is also faster for some of the ones they have in common):
https://github.com/hops/pack2 |
|
royce |
General Talk
|
2 |
2,421 |
08-25-2021, 07:44 AM |
|
|
Thread: BigCrypt hash
Post: RE: BigCrypt hash
I don't think that hashcat supports it. John the Ripper supports BigCrypt, which is actually an HP-authored extension of descrypt that supports longer passwords. I think it is still found on HP-UX but... |
|
royce |
hashcat
|
2 |
3,536 |
08-25-2021, 02:00 AM |
|
|
Thread: crude shell script for running *all* benchmarks
Post: RE: crude shell script for running *all* benchmark...
[a necromancer appears]
This has been superseded by --benchmark-all. :D |
|
royce |
User Contributions
|
2 |
5,616 |
07-25-2021, 07:08 AM |
|
|
Thread: Specific pattern syntax help
Post: RE: Specific pattern syntax help
That would be --elem-cnt-min=4 --elem-cnt-max=7, then. :D |
|
royce |
hashcat
|
3 |
4,005 |
07-24-2021, 06:06 AM |