Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Inconsistency between dictionary attack and brute force attack
Post: RE: Inconsistency between dictionary attack and br...
slyexe Wrote: (09-17-2024, 02:54 AM)
--
if that password was previously cracked, it will be stored in your hashcat.potfile which is scanned previously for any matching hashes. If that has a match it ... |
|
PerCT |
hashcat
|
2 |
2,270 |
09-17-2024, 11:26 AM |
|
|
Thread: Help for create correct hash-format on MD5 sip digest 11400 atack
Post: RE: Help for create correct hash-format on MD5 sip...
The provider changes the passwords format from "upper + digits" to "upper + lower + digits".
I get my sip account password with:
hashcat -a 3 -m 11400 -o output.txt hash.txt ?1?1?1?1?1?1?1?1 -1 ... |
|
PerCT |
hashcat
|
1 |
1,786 |
09-16-2024, 07:08 PM |
|
|
Thread: Inconsistency between dictionary attack and brute force attack
Post: Inconsistency between dictionary attack and brute ...
Hi all!
I have successfully cracked a hash type 11400 (SIP Digest) with the command:
hashcat -a 3 -m 11400 hash.txt ?1?1?1?2?3?3?3?1 -1 ?l -2 ?u -3 ?d
For example, suppose the result of this atack... |
|
PerCT |
hashcat
|
2 |
2,270 |
09-16-2024, 06:43 PM |
|
|
Thread: Help for create correct hash-format on MD5 sip digest 11400 atack
Post: Help for create correct hash-format on MD5 sip dig...
Hello everyone:
I am capturing data from the registration process of my router to my provider's SIP server. The provider does not deliver the data to the end users. I think I have obtained everythi... |
|
PerCT |
hashcat
|
1 |
1,786 |
09-01-2024, 11:54 AM |