Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help

(Apologies for the late reply; I don't haunt the hashcat forums much any more) NoolanJ Wrote: (08-19-2022, 11:02 PM) -- ...still interesting thread, as I have the same problem with a file, I encry...
womble hashcat 21 47,766 02-20-2024, 02:06 AM
    Thread: Atmoic Wallet
Post: RE: Atmoic Wallet

I doubt that Atomic Wallet is using a single round of unsalted MD5. How did you "convert the .dat file to a MD5 hash"? In any event, brute-forcing a 16 character passphrase, even straight MD5, is go...
womble hashcat 2 7,229 09-22-2020, 06:22 AM
    Thread: Looking to crack password on AppleSecureNote
Post: RE: Looking to crack password on AppleSecureNote

It means that you need to pass the location of the file that contains the secure note data (which is probably somewhere on your system named NoteStore.sqlite) as an argument to the script.  Try runnin...
womble hashcat 5 15,885 08-03-2020, 11:59 AM
    Thread: LUKS version 2
Post: RE: LUKS version 2

Loopy Wrote: (07-22-2020, 06:45 PM) -- I think the crux of my problem can be answered with one question: Does Hashcat have support for LUKS2 built into mode 14600? -- No. Here's the Github issue: ...
womble hashcat 2 11,825 07-23-2020, 09:27 AM
    Thread: Hashcat Mask Attack
Post: RE: Hashcat Mask Attack

Off the top of my head... -1 123456789 -2 0123456789- -3 abcdABCD0123456789- -4 abcdABCD0123456789 ?1?2?3?4?4?4?4?4?4(etc)
womble General Talk 8 21,572 05-29-2020, 04:10 AM
    Thread: Can semi broken gpu still work for hashcat?
Post: RE: Can semi broken gpu still work for hashcat?

A graphics card whose only fault is an inability to drive a monitor is OK for use with hashcat, *however* the number of things that can cause no display, but which don't impact GPU operation, are limi...
womble Hardware 2 6,812 05-27-2020, 12:42 PM
    Thread: What is the speed of Hashcat for cracking wallet.dat using GPU?
Post: RE: What is the speed of Hashcat for cracking wall...

At 9,927,360,000 hashes per day, that's 62^8 / 9,927,360,000 => 21993.77 days. Something of an enforced HODL.
womble hashcat 15 48,492 05-27-2020, 12:40 PM
    Thread: Whats up with this hardware
Post: RE: Whats up with this hardware

ekingxxx70 Wrote: (05-25-2020, 05:07 PM) -- How do I pick my next Machine that can maximize cracking performance?  -- You buy as much NVidia GPU as you can afford, as much RAM as you have GPU memor...
womble Hardware 4 11,967 05-26-2020, 06:45 AM
    Thread: Hashcat not recognizing my GPU
Post: RE: Hashcat not recognizing my GPU

"The pocl project" That's not likely to work well. I've had terrible trouble with POCL getting in the way of my other OpenCL configs, and I've basically blacklisted it from my systems now, it's mo...
womble hashcat 7 36,733 05-23-2020, 09:15 AM
    Thread: Problems decrypting hash from 128bit RC4 PDF
Post: RE: Problems decrypting hash from 128bit RC4 PDF

"Token Length Exception" does, indeed, mean that your hash does not meet the expectations of the module. The only way I've found of debugging exactly what is wrong is to read the module source to fig...
womble hashcat 2 7,001 05-23-2020, 09:10 AM
    Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help

I've made your bit of python redundant, I'm afraid -- but on the upside, false positives should be a thing of the past! You'll want to use https://github.com/mpalmer/bfacs2hashcat to extract the hash...
womble hashcat 21 47,766 05-19-2020, 04:07 PM
    Thread: Password recovery - 3 attack avenues?
Post: RE: Password recovery - 3 attack avenues?

... and that is why you don't pre-generate brute-force datasets.
womble General Talk 4 9,432 05-19-2020, 04:25 AM
    Thread: i9-9900K, GTX 1080 Ti Gaming X 11G
Post: RE: i9-9900K, GTX 1080 Ti Gaming X 11G

hashcat --benchmark -m 13600 should work -- no need to post hashes.
womble Hardware 9 21,621 05-19-2020, 04:24 AM
    Thread: Password recovery - 3 attack avenues?
Post: RE: Password recovery - 3 attack avenues?

The size of the data being cracked does not generally change the difficulty of cracking the passphrase. It doesn't look like pCloud is something that hashcat can crack, so it's down to either Veracry...
womble General Talk 4 9,432 05-18-2020, 07:27 AM
    Thread: Doing Works In Pc can give wrong results When Cracking
Post: RE: Doing Works In Pc can give wrong results When ...

Doing other things on the machine that is running hashcat will not produce incorrect results. It will only reduce the speed of cracking.
womble hashcat 1 4,866 05-18-2020, 07:21 AM
    Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help

philsmd Wrote: (05-15-2020, 12:59 PM) -- oh... are you mpalmer on github ? yeah, I see that there are some still open PRs, I think atom/jsteube is busy a lot, but I will try to ping him on IRC etc. n...
womble hashcat 21 47,766 05-16-2020, 03:55 AM
    Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help

philsmd Wrote: (05-15-2020, 08:39 AM) -- @womble, do you plan on sharing your hashcat module and opening a pull request (PR) on github ? -- Yes, although I'm in no hurry given that my other PRs don...
womble hashcat 21 47,766 05-15-2020, 11:38 AM
    Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help

You really helped doing that decode and annotation -- made the whole thing pretty easy. Like you, I got misled by the source, by the use of the word "key" with reference to the MD5 check (in the call...
womble hashcat 21 47,766 05-15-2020, 07:46 AM
    Thread: HC and Blowfish Advanced CS Help
Post: RE: HC and Blowfish Advanced CS Help

That decoding is really helpful -- if the "Folded MD5 of salt+key" is what it sounds like, that'd be the ticket be able to detect whether you've got the correct passphrase -- or at least a good candid...
womble hashcat 21 47,766 05-15-2020, 05:27 AM
    Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode

As a comparison: $ hashcat --keyspace -a 3 ?a?a?a?a 857375 $ hashcat --keyspace -a 3 -1 ?l?u?d ?1?1?1?1 238328 So you're doing about 4x as much work by using ?a?a?a?a. Probably not enough of...
womble hashcat 7 18,862 05-10-2020, 04:20 PM