|
Search Results
|
| Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
| |
|
Thread: AES-128 and Integer overflow detected in keyspace of mask
Post: RE: AES-128 and Integer overflow detected in keysp...
| Thanks for the explanation about the Markov model. I don't see the advantage in using such a model when it comes to raw hex numbers, where no hex is more likely than another one. With text based passw... |
|
strcmp |
hashcat
|
8 |
5,665 |
10-14-2025, 10:07 AM |
| |
|
Thread: AES-128 and Integer overflow detected in keyspace of mask
Post: RE: AES-128 and Integer overflow detected in keysp...
|
penguinkeeper Wrote: (10-09-2025, 06:26 PM)
--
In your example, you have 32 hexadecimal characters, which makes your mask half the size it should be, which blows it up into the same 3.4e38, which als... |
|
strcmp |
hashcat
|
8 |
5,665 |
10-10-2025, 05:20 AM |
| |
|
Thread: AES-128 and Integer overflow detected in keyspace of mask
Post: RE: AES-128 and Integer overflow detected in keysp...
| Thanks for the fast response!
Actually, it's all hex. I forgot to mention in the OP (corrected).
Example of hashes.txt
Code:
--
45a32b45274d523f29528e53f4eea320:64b25e189238b3cc59e46e39ff726432
--
... |
|
strcmp |
hashcat
|
8 |
5,665 |
10-09-2025, 06:05 PM |
| |
|
Thread: AES-128 and Integer overflow detected in keyspace of mask
Post: AES-128 and Integer overflow detected in keyspace ...
| Hi.
I'm trying to make myself familiar with hashcat.
I would like to get the right command arguments to crack 16 bytes crypt to 16 bytes plain using AES-128 (also 16 bytes).
All hex!
Code:
--
$ ha... |
|
strcmp |
hashcat
|
8 |
5,665 |
10-09-2025, 05:36 PM |
| |
|
Thread: DES performance possible with identical crypts?
Post: RE: DES performance possible with identical crypts...
|
marc1n Wrote: (08-05-2023, 12:42 PM)
--
Never ever use --force in commandline this generated only error...
Cracking performance lower than expected?
* Append -S to the commandline.
This has a dra... |
|
strcmp |
hashcat
|
4 |
9,722 |
08-06-2023, 10:13 AM |
| |
|
Thread: DES performance possible with identical crypts?
Post: DES performance possible with identical crypts?
| Hello.
I would like to crack two DES (-m 14000) token.
crypt and plain are 8 bytes each.
hashes.txt:
Code:
--
crypt : plain1
crypt : plain2
--
Note that both pairs use the same crypt, which is ... |
|
strcmp |
hashcat
|
4 |
9,722 |
08-05-2023, 11:17 AM |
| |
|
Thread: Brute TrueCrypt password
Post: RE: Brute TrueCrypt password
| Still looking for my lost password.
Just to be sure ... when I use dd from (e.g.) Ubuntu, does it matter if the (SATA) HDD is connected via USB bay, or does it need to connected via SATA (eSATA)? |
|
strcmp |
hashcat
|
5 |
14,559 |
03-21-2022, 06:58 AM |
| |
|
Thread: Brute TrueCrypt password
Post: RE: Brute TrueCrypt password
|
Sondero Wrote: (02-22-2022, 12:15 PM)
--
1.) for default, stored in potfile, but it doesnt matter, because your attack will take hundreds of years ;)
--
Yes, I saw now that it takes ages ... :(
May ... |
|
strcmp |
hashcat
|
5 |
14,559 |
02-22-2022, 03:16 PM |
| |
|
Thread: Brute TrueCrypt password
Post: RE: Brute TrueCrypt password
|
Code:
--
$ hashcat.exe -m 6213 -a 3 -w 3 --increment --increment-min 6 -o cracked.txt --truecrypt-keyfiles=kf.xyz sdb1_dump.dd -1 ?l?u ?a?1?1?1?1?1?a?a?a?a?a?a?a?a?a?a
--
I did some test runs on a c... |
|
strcmp |
hashcat
|
5 |
14,559 |
02-21-2022, 07:40 PM |
| |
|
Thread: Brute TrueCrypt password
Post: Brute TrueCrypt password
| Is it possible to crack the TrueCrypt volume password?
Encryption Algorithm: AES-Twofish-Serpent
Hash Algorithm: RIPEMD-160
Keyfile was used (which I have).
I tried all passwords I usually use, but ... |
|
strcmp |
hashcat
|
5 |
14,559 |
02-20-2022, 12:54 PM |
| |
|
Thread: Getting DES faster
Post: Getting DES faster
| Hello.
Hope I'm in the right forum.
I'm presently digging into DES (-m14000) in order to understand what happens on bit level. I have a 2080 SUPER and get my own written kernels to ridiculous #5... |
|
strcmp |
hashcat
|
0 |
5,827 |
12-21-2020, 07:32 PM |
| |
|
Thread: hashcat in VM
Post: RE: hashcat in VM
| Can someone help with the configuratiuon of hashcat when 3DES should find a key where K1=K3?
Or a hint ...
Thanks |
|
strcmp |
hashcat
|
12 |
57,936 |
12-21-2019, 05:39 PM |
| |
|
Thread: hashcat in VM
Post: RE: hashcat in VM
| Thanks for the extensive explanations. I knew about the 80 bit effective key for my situation (K1=K3). Indeed, I'm presently looking for a weakness/hints/scheme in the key, being aware that brute-forc... |
|
strcmp |
hashcat
|
12 |
57,936 |
12-08-2019, 10:06 PM |
| |
|
Thread: hashcat in VM
Post: RE: hashcat in VM
| My situation is keying option 2, where k1=k3.
Hence 128 (effective 112 bits).
The key is 16 Bytes
So hashcat is not suitable for this, right? |
|
strcmp |
hashcat
|
12 |
57,936 |
12-08-2019, 06:10 PM |
| |
|
Thread: hashcat in VM
Post: RE: hashcat in VM
| Ok ... works great. Thanks a lot !!!
RTX 2080 seems to be recognized.
However I have another issue, but this is off-topic for this thread.
I get ...
Code:
--
Minimum password length supported... |
|
strcmp |
hashcat
|
12 |
57,936 |
12-08-2019, 05:47 PM |
| |
|
Thread: hashcat in VM
Post: RE: hashcat in VM
| I had preference for the VM due remote access possibility.
That's more difficult to console access to W10.
But you are right - I'll try the native x86 version (and let you know) ... |
|
strcmp |
hashcat
|
12 |
57,936 |
12-08-2019, 05:12 PM |
| |
|
Thread: hashcat in VM
Post: RE: hashcat in VM
| Thanks a lot for your quick response.
The VM was for testing purpose only.
Just wondering if this wouöd work.
I need the host W10 constantly, hence a VM on top would pemit use of both machines in /... |
|
strcmp |
hashcat
|
12 |
57,936 |
12-08-2019, 04:42 PM |
| |
|
Thread: hashcat in VM
Post: hashcat in VM
| Hi.
First post here.
New w/ hashcat.
I googled now for +2 hours ... no joy.
Basic question ... does hashcat 5.1.0 work properly in VM (VirtualBox - host W10) and make use of GPU?
Host:
NVI... |
|
strcmp |
hashcat
|
12 |
57,936 |
12-08-2019, 04:13 PM |