Quantcast
Channel: hashcat Forum - All Forums
Viewing all 8066 articles
Browse latest View live

ETH wallet - Salt-length exception

$
0
0
Hi there
I got few hashes which are the same version, but one of them is 2 numbers shorter and cannot be loaded

Hashfile 'wallet12.txt' on line 1 ($ethereum$s*262144*8*1*e2bef244cc8e48452c51e61356cb33f91e0a4887b52ab36b301754fbe11c3eea*056f7a344594249a6d639cfd951c49eb4a9a948addbb4c727fb590328c60c4*e1d1586d0b8f09a2fe73d5db5cd150f559c8237fa4440931b023263de687eb1f): Salt-length exception

Actually I compared this hash with few another hashes and the ciphertext is 2 numbers shorter

the above is the shorter version, tested with ethcracker and the hash has been accepted. 

any idea how to resolve this issue.
thanks

Stdin and stdout simultaneously

$
0
0
Is it possible to use hashcat to use both stdin and stdout with hashcat simultaneously in order to generate candidates with --stdout?

I can only get this to work if I am using a file as the input to hashcat.  If I want to feed hashcat with stdin, it doesn't work.

This is an example that won't work.

./data_generator.sh | ./hashcat64.bin -r ./rules/dive.rule --stdout --outfile-autohex-disable

My goal is to use hashcat and its available rules in order to modify whatever I feed it via stdin.

Should this work or is it not a feature?

Multibit Classic setup?

$
0
0
How can i use hashcat with a multibit classic hash? 

I have used JTR that has a native multibit support but want to utilize hashcat combinator attack instead.

Thanks

Rockyou hcmask files

$
0
0
What's the significance of the naming of the included rockyou hcmask files?

TrueCrypt 7.1a Decrypt

$
0
0
Hello,

I ask you please help to decrypt a file. I remember the password, part of the password, or so I think. I'm not an expert in softrware, I do not program. That's why I strongly urge you how to get it.

I have a file, which I mounted with truecrypt.

I think the steps I have to follow are these:

     1.- Remove the Hash from the encrypted file that I have.
     2.- Create a dictionary.
     3.- Make hashcat decrypt

It is right?, crep I have extracted the hash, with the following command in ubuntu:

dd skip=31744 count=512 if=output.binary of=output.binary bs=1

*output.binary=File encrypted

now I have a file called "output.binary":, which is not checked if it is correct, and I do not know the next step.

PD: if you know any company, specialist I am willing to pay for the service.

zip2john Hash Problems

$
0
0
Hi All -

Using the latest version of the John Jumbo package and "zip2john" program to generate a hash to attack with hashcat. If I manually modify the hash so that it looks similarly formatted to the example on the examples page, it says "Salt-value exception". If I leave it in the unmodified format that comes out, it says "Signature unmatched". I've tried piping input and copy and pasting the hash value into a file and supplying directly via the command line for the program. I'm thinking that there have been changes to the format of the output of the zip2john program, but I'm not sure how to modify what it's spitting out to make it work. 

I can also confirm that the hash it's spitting out is NOT a pkzip hash.

I know we are not supposed to post hashes, but I can provide one or I can summarize some sections. As always, thank you for your help!

Decrypt me the bcrypt and i give 15$ BTC

$
0
0
Hello !

I need a guys for decrypt a password "bcrypt",it's possible ?

$2a$10$Rq179lWfJJrDHwmqHQrScedBliPvriBqCjIURtqJ0Lh9SxnTxmLja

I have 15$ bitcoin !

[ask] cap to hccapx

$
0
0
hi, i work on project that included hashcat and i need to convert cap to hccapx
but in java/python (java is better for me)

anyone did it ?

WPA/WPA2 pass cracking

$
0
0
Just wanted start a discussion on general suggestions on how to make WPA/WPA2 password cracking less sophisticated. How would you build your research if all you knew is AP's SSID?

Formatting mask for mask attack

$
0
0
Hello,

I'm attempting to generate a list of possible passwords for an encrypted drive password. I remember the general setup, however I'm not sure which letters I switched for numerals or symbols. The password is formatted similar to this: "Th!s !s a t3st, n0t a r3@l p@ssw0rd." So there a quite a few characters where I'm 100% certain on, and a handful that could be a symbol or a letter. Is there a good or simple way to format the mask for, for example, that example password? (EG "Th*s *s a t#st" where * can only be i or ! and # can only be # or e)

Thanks!

NEED HELP

$
0
0
hi did someone test hashcat with amd Adrenalin Edition 17.12.1 drivers
because i install them and now hashcat is show me  HWMon.Dev.#1...: N/A and HWMon.Dev.#2...: N/A
this is on windows 10 64-bit hashcat ver. 4.0.1 and hashcat 4.0.1+57 beta.
Thank you Smile

Hard to crack this hash?

$
0
0
I have got stuck at a phpass hash that I can't seem to get the combination right to. 
I have tried both a dictionary (rockyou with some extra wordlists) 
I have tried a brute force attack 5-8 length
And also different types of masks. 

Like: 
?l?l?l?l?l?l?l?l
?3?3?3?1?1?1?1?2?2?4?4?4?4
?a?a?a?a?a?a

I have runned several different types of test hashes with a good sucess rate. 
But this one got me really stuck. Trying to find the right combination. 

Please help if your able to:
Hash: $P$BEi9BXHYxrEPv7vyLX.bKDFikBJpcc0

I don't understand, should be easy one.

New to hashcat, help needed.

$
0
0
Hi, I'm just starting to use hashcat. I primarily need it to get into my old Litecoin core wallet from 2014(forgot passphrase). I was hoping someone here could point me towards some guides/tutorials on how to use hashcat to specifically unlock a wallet.dat file. Unfortunately, I'm not doing very well in tracking down the resources I need on youtube or google.

I have a Geforce GTX 1070 on my rig, and so far I've tried btcrecover with a possible password+typos list, and after hours of work I'm still no closer, which means the passphrase is probably nothing like I thought it was. I figured hashcat was my best bet now. Thanks.

Itunes Backup line length

$
0
0
I forgot the password to my itunes backup. I already used hex editor and got my WKPY, ITER, SALT, DPIC, and DPSL. Got that in a text file. I am getting the error "line-length exception. No hash loaded." 

c:\hashcat>hashcat64 -d 1 "manifest.txt" -14800 -a 3 ?d?d?d?d?d?d?d?d?d?d

hashcat (v4.0.1) starting...

OpenCL Platform #1: Advanced Micro Devices, Inc.
================================================
* Device #1: BeaverCreek, 512/1487 MB allocatable, 4MCU
* Device #2: AMD A6-3600 APU with Radeon(tm) HD Graphics, skipped.

Hash 'manifest.txt': Line-length exception
No hashes loaded.

Started: Wed Dec 13 20:48:58 2017
Stopped: Wed Dec 13 20:48:59 2017

I should also note I have zero idea what the password may be. Don't know how many characters or capital letters or numbers. I am trying to brute force attack it. Any tips or help is appreciated as this is my first time using hashcat, though I am computer savvy.

Benchmark -m15700

$
0
0
Hi guys

Im a newbie and try to find out a etherwallet password.

iMac (Retina 5K, 27-inch, Late 2015)
3.2 GHz Intel Core i5
24GB 1867 MHz DDR3

Is ist not possible to make a benchmark with -m15700?
First i did one with Hashmode 1000 - NTLM and it works.

Code:
mac:hashcat save$ ./hashcat -b -m1000 -O
hashcat (v4.0.1-61-ga3822e04) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz, skipped.
* Device #2: AMD Radeon R9 M390 Compute Engine, 512/2048 MB allocatable, 16MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 1000 - NTLM

Speed.Dev.#2.....:  6322.5 MH/s (84.39ms)

Started: Thu Dec 14 17:08:06 2017
Stopped: Thu Dec 14 17:08:09 2017
imac:hashcat save$ ./hashcat -b -m15700 -O
hashcat (v4.0.1-61-ga3822e04) starting in benchmark mode...

Benchmarking uses hand-optimized kernel code by default.
You can use it in your cracking session by setting the -O option.
Note: Using optimized kernel code limits the maximum supported password length.
To disable the optimized kernel code in benchmark mode, use the -w option.

OpenCL Platform #1: Apple
=========================
* Device #1: Intel(R) Core(TM) i5-6500 CPU @ 3.20GHz, skipped.
* Device #2: AMD Radeon R9 M390 Compute Engine, 512/2048 MB allocatable, 16MCU

Benchmark relevant options:
===========================
* --optimized-kernel-enable

Hashmode: 15700 - Ethereum Wallet, SCRYPT

* Device #2: Skipping unstable hash-mode 15700 for this device.
            You can use --force to override, but do not report related errors.

Started: Thu Dec 14 17:08:39 2017
Stopped: Thu Dec 14 17:08:40 2017

Part of a password

$
0
0
As a beginner, I once have a question. Maybe not a good one :-)

Is it possible to find out just a part of a password with hashcat? Maybe then I can find out the rest!

Thanks

Am I waisting my time?

$
0
0
Script Kitty, trying to learn linux & hashcat.

I have a radeon 6950 HD with a FX AMD 8core processor.

Tried to get both to work together in Windows 7 & K a l i Linux

No success.

Windows 7 - will work for 1 min @ 50000 H/s then it crashes the whole computer. It does say OpenCL self test failed.
I ran the instructions found here
This did not help, I'm not sure if "AMD Radeon Software Crimson Edition" (15.12 or later)" really supports this card.

K a l i - it completely ignores my gpu. I think the problem is ROCm not supporting my card?

I have checked the websites about driver support for this card and it's iffy, or non existent.
But that 1 min @ 50K H/S had me going to try other possibilities. Regular speeds on cpu only is 5K H/S.

I really appreciate any insight/advise you may have to offer.

I have a question

How do i use this hash? 50USD reward

$
0
0
Hi,

I extracted this multibit classic hash with https://github.com/magnumripper/JohnThe ... it2john.py
sleepy.key:$multibit$1*935f8d9b235bff03*e25936c998d095467b727db1028d9d6e4a6660bb8c48b4b6fb43ab8c348c45f2

Password is: WinSuxx

I also tried to extract with btcrecover script https://github.com/gurnec/btcrecover/blo...privkey.py

MultiBit partial first encrypted private key, salt, and crc in base64:
bWI6k1+NmyNb/wPiWTbJmNCVRntyfbECjZ1u3s9Iww==

same password as above

Now i want to use any of the hash with hashcat combinator attack, how do i write the hash in the hashcat hashfile and how do i run the command?

I pay 50usd in cryptocurrency for a solution that works. Please PM your details.

Would appreciate assistance with forming correct command structure

$
0
0
Hello,


My brother asked me to help him recover his lost litecoin wallet/private key. I am an IT pro, familiar with LINUX and have mining rigs I can run this on. I have completed the installation of hashcat, successfully benchmarked the system, extracted the wallet.dat hash and am ready to begin the process on a (6) GPU NVidia 1070 system.

Where I would appreciate assistance in forming the complete and proper command for this situation. He knows it is a 12 character password mixing upper case, lower case and special characters. He gave me some characters that are very likely in the password. In addition, he indicated that the characters would be placed next to each other in the password such as 

32 <something else>47<somethingelse>51<somethingelse>

These are the numbers he indicated are include in groups, ie "3,2" "4,7" and "5,1"

There is a decent likelihood that they appear this way but the exact positions are not known. Ideally I think this needs to be brute-forced but giving priority to include these numbers first in all the permutations.

Frankly, I have no idea about how to implement that here and all help is greatly appreciated.

Also, knowing it is 12 characters, is it possible to develop an estimate of the processing time required?


Thank you in advance

Steve
Viewing all 8066 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>