Search Results
|
Post |
Author |
Forum |
Replies |
Views |
Posted
[asc]
|
|
|
Thread: Lost access to Trezor one, no longer have the words in order
Post: RE: Lost access to Trezor one, no longer have the ...
hashcat doesn't support any Trezor-related formats that I'm aware of. I'll have to defer to other people's experience if there's a way to carry out an attack offline against an extracted Trezor 'hash'... |
|
royce |
hashcat
|
1 |
176 |
04-17-2021, 08:12 AM |
|
|
Thread: Dont know hash mode i used
Post: RE: Dont know hash mode i used
Posting hashes is against forum rules.
https://hashcat.net/forum/archive/index.php?announcement-2.html
You can post a semi-redacted form of the hash, and describe what character set and composition i... |
|
royce |
hashcat
|
1 |
702 |
04-13-2021, 02:01 AM |
|
|
Thread: HC Clustering - offical or aftermarket?
Post: RE: HC Clustering - offical or aftermarket?
hashcat has an API that can be wrapped in another framework. Hashtopolis is a FOSS one. |
|
royce |
hashcat
|
1 |
437 |
03-08-2021, 08:35 AM |
|
|
Thread: how to write a Reject not contain rule
Post: RE: how to write a Reject not contain rule
1. The answer depends on the "speed" of the hash - fast (like MD5) vs slow (like bcrypt).
1a. If it's a fast hash, it's usually not worth the time to perform the rejection. Start up the attacks with ... |
|
royce |
General Talk
|
1 |
637 |
02-20-2021, 06:53 PM |
|
|
Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)
I don't know about it's official bug/feature status, but I can say that with all remaining bits being identical, the likelihood of any given hash being anything other than an accidental or deliberate ... |
|
royce |
hashcat
|
11 |
3,920 |
02-13-2021, 06:22 PM |
|
|
Thread: VCL: bindshell.nl - denied question...
Post: RE: VCL: bindshell.nl - denied question...
No worries at all - exploration of the problem space comes to an occasional temporary dead end. :D Keep exploring! |
|
royce |
hashcat
|
6 |
1,187 |
02-11-2021, 04:46 AM |
|
|
Thread: VCL: bindshell.nl - denied question...
Post: RE: VCL: bindshell.nl - denied question...
I think this is pretty outdated. I'd expect something like Hashtopolis to cover most modern use cases. I don't think epixoip maintains any of that anymore. |
|
royce |
hashcat
|
6 |
1,187 |
02-11-2021, 03:01 AM |
|
|
Thread: VCL: bindshell.nl - denied question...
Post: RE: VCL: bindshell.nl - denied question...
Can you supply some additional context? I don't recognize this workflow (though I do recognize the domain name). |
|
royce |
hashcat
|
6 |
1,187 |
02-10-2021, 06:50 AM |
|
|
Thread: mask attack but with wordsets instead of charsets?
Post: RE: mask attack but with wordsets instead of chars...
Not dense at all - understandable use case, but not a lot of clear tools or guidance out there for it.
There are some complex ways to do this, but the closest tool available is 'combinatorX', which... |
|
royce |
hashcat
|
2 |
567 |
02-07-2021, 03:21 AM |
|
|
Thread: hashcat-4.0.1 mask
Post: RE: hashcat-4.0.1 mask
Not related to your question, but also note that hashcat 4.x is quite outdated, and you might consider testing latest stable (6.1.1) to avoid bugs, better performance, etc etc. |
|
royce |
hashcat
|
3 |
754 |
01-27-2021, 05:47 AM |
|
|
Thread: Mask processor suggestion
Post: RE: Mask processor suggestion
Why?
(People who request this are almost always hoping to "get lucky", and believe that randomizing the attack will somehow improve the odds of getting a crack sooner. The math of this should make ... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
2,949 |
01-18-2021, 05:44 AM |
|
|
Thread: Found part of my password!! Now what?:)
Post: RE: Found part of my password!! Now what?:)
Do the math of how many passwords will be skipped if you can impose these restrictions, vs not imposing them, and use this as a basis to calculate the expected runtime for both attacks. |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
4 |
1,281 |
01-18-2021, 05:43 AM |
|
|
Thread: using htaccess for chained protection
Post: RE: using htaccess for chained protection
This seems completely unrelated to hashcat or cracking password hashes. Why are you asking here? |
|
royce |
General Talk
|
1 |
929 |
01-18-2021, 05:42 AM |
|
|
Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack
Test your attack against a known set of bcrypt hashes and their plains. Once that's working, you'll know that your method is correct. |
|
royce |
Beta Tester
|
24 |
17,644 |
01-15-2021, 08:36 PM |
|
|
Thread: Showing Combos
Post: RE: Showing Combos
If I'm understanding your question ... you can get it to both show *all* combos *and* perform the actual attack at the same time:
* If you use --stdout, all combos will be shown, but there's no att... |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
1 |
947 |
01-10-2021, 02:47 AM |
|
|
Thread: Context free grammar masks
Post: RE: Context free grammar masks
There is indeed some work in this space, by lakiw:
https://github.com/lakiw/pcfg_cracker
Not CFG per se IIRC, but this may also be of interest:
https://github.com/brannondorsey/PassGAN |
|
royce |
hashcat
|
2 |
1,261 |
01-09-2021, 10:04 PM |
|
|
Thread: Brute Force Russian letters
Post: RE: Brute Force Russian letters
You're not crazy - this may help - https://hashcat.net/forum/thread-8794.html |
|
royce |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
3 |
1,308 |
01-07-2021, 02:28 AM |
|
|
Thread: Bcrypt help for a dummy
Post: RE: Bcrypt help for a dummy
With a single hash as the target, start up the attack - hashcat -a 3 ?d?d?d?d - and see what the time estimate is, and assess whether you want to wait that long. :) |
|
royce |
hashcat
|
2 |
1,618 |
12-27-2020, 12:35 AM |
|
|
Thread: Can I divide the workload into three levels ?
Post: RE: Can I divide the workload into three levels ?
Yep, it's a fundamental property of proper password hashing that you have to know all of the characters in order to successfully crack the hash. |
|
royce |
hashcat
|
3 |
1,617 |
12-09-2020, 09:08 PM |
|
|
Thread: Bitlocker
Post: RE: Bitlocker
Yep, just practice seeing if you can crack *any* similarly provisioned Bitlocker hash.
For your real target, if you have no idea what the constraints on the creation of the original plaintext were,... |
|
royce |
hashcat
|
5 |
2,383 |
12-06-2020, 12:25 AM |