-
Would it be possible to have an option to output into john the ripper or oclhashcat format for cracking?
*(Added by derv82@)*
Other requirements mentioned below:
1. `--later` option to *not* …
-
(target hash) < or = or > (constant value + (variable)) hash parallel on ocl.
-
Your current Server version located at the bottom of any hashtopussy webpage.
0.5.0 Alpha
Current Client version
0.50.2
Your current Hashcat version
4.0.1
## Issue Description
Me again (s…
-
did all by manual
but got this message
fenix@fenix-System-Product-Name:~/hashtopussy$ sudo mono ./hastopussy.exe
Client Version 0.52.1
Connecting to server http://192.168.1.14/api/server.php
S…
-
hey ya,
so i am trying to use Scrypt when running it on the hash example it works with no error, but when i try to run it on another Scrypt hash the error happen.
command
hashcat64.exe -a 3 -…
kolet updated
6 years ago
-
Hi,
after running lsadump::sam i can see the local administrator NTLM hash. Can this has be converted to the Windows password.
I need to know the password.
THX
-
I have a test network that I want to crack. I found that if I set WPA-PSK to `Password123` - I can crack it using my password file and my ruleset:
password.txt:
```
password
bentley
```
ruleset:…
-
As we know, the `hash` method is returning a JSON string which contains: hash, salt, keyLength, hashMethod, iterations. Now, without knowing how an app using this library is hashing passwords, the att…
-
This would **significantly** increase the difficulty of cracking the password hashes.
Though I realise this is probably a stretch goal.
-
Password security as it is is not suitable for production use :
- We are using sha256, which is too fast for password hashing (see [this](https://security.stackexchange.com/questions/90064/how-sec…
iodbh updated
6 years ago