Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: LUKS Support
Post: RE: LUKS Support
Excellent work atom!
Using right now on a LUKS drive, getting about 1200 H/s!
Speed.Dev.#1.....: 302 H/s (41.72ms)
Speed.Dev.#2.....: 311 H/s (40.28ms)
Speed.Dev.#3.....: 302 H/... |
|
timi2shoes |
User Contributions
|
12 |
84,562 |
02-03-2017, 09:10 PM |
|
|
Thread: hashcat and oclHashcat have gone open source
Post: RE: hashcat and oclHashcat have gone open source
Thank you, excellent work!!
This will be a life saver in those instances where I need the power of hashcat but just slightly modified! |
|
timi2shoes |
Organisation and Events
|
20 |
173,193 |
12-04-2015, 08:44 PM |
|
|
Thread: Cracking eight different TrueCrypt ciphers for the price of three
Post: RE: Cracking eight different TrueCrypt ciphers for...
Incredible, keep it up!!! Cant wait for the new features!! |
|
timi2shoes |
Old oclHashcat Support
|
1 |
34,538 |
11-13-2015, 06:07 PM |
|
|
Thread: TrueCrypt Boot 7.1a Hash Extraction
Post: RE: TrueCrypt Boot 7.1a Hash Extraction
Ok, so I found the correct byte offset. Starting at the first of the drive wrote a program that ran through and tested 512 byte chunks at a time. The hash succeeded at Sector 62 byte offest 31744.
Th... |
|
timi2shoes |
Old oclHashcat Support
|
5 |
19,689 |
05-11-2015, 08:23 PM |
|
|
Thread: TrueCrypt Boot 7.1a Hash Extraction
Post: RE: TrueCrypt Boot 7.1a Hash Extraction
Yes, I did. That is why I tried every 512 byte possible combination.
From the tree.jpg photo I have attached. Where should I have carved the 512 bytes? |
|
timi2shoes |
Old oclHashcat Support
|
5 |
19,689 |
05-11-2015, 05:10 PM |
|
|
Thread: TrueCrypt Boot 7.1a Hash Extraction
Post: TrueCrypt Boot 7.1a Hash Extraction
I am testing cracking the password of a known boot drive with oclhc but have been unable to get it working correctly.
Command used
Code:
--
oclHashcat64.exe -m 6241 c:\inputfile-512b c:\test-words
... |
|
timi2shoes |
Old oclHashcat Support
|
5 |
19,689 |
05-06-2015, 10:53 PM |