NOTE: When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

Home - General Discussion - Tip of the day

WARNING!
Due to the number of SCAMS going on in the PAID forum, PLEASE ask an ADMIN or MODERATOR to verify ALL found passwords to ensure you are not being SCAMMED.
DO NOT PAY until an ADMIN or MOD has verified them for you!


40 Results - Page 1 of 2 -
1 2
Author Message
Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Fri, 09 Nov 2018 @ 10:01:01

How to create dictionary using hashcat with any rule.file (or check a custom rule.file)

Code:

"hashcat --stdout dictionary.txt -r /usr/share/hashcat/rules/nsa64.rule -o generated_candidates.txt"

------------------------------------------------------------------------------------------------------------------------------------------------------------
"Passwords are like underwear: don't let people see it, change it very often, and you shouldn't share it with strangers"

Chris Pirillo




If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sat, 10 Nov 2018 @ 09:58:01

How to check the Message Integrity Code (MIC) of a 4-ways handshake.

Method 1.:

"wlanhcxinfo -i handshake.hccapx -M"

Note: "wlanhcxinfo" is a part of the hcxtools package.

Method 2.:

Using a python script (coded by Alex, site owner of wpa-sec.stanev.org)

Script usage: "mic.py handshake.hccapx"

Output: 

Message Integrity Code:  68e5aa7dda3ed236929ea94c3ed67d9d
Message Integrity Code:  a920c43e3c07a1f14d76e2fbe572b2ab
Message Integrity Code:  a920c43e3c07a1f14d76e2fbe572b2ab


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sun, 11 Nov 2018 @ 10:58:46

Scenario: We have a big bcrypt raw-hashes list -- "raw_hashes.txt". Founds are in the file "found_hashes.txt"
Task: Create left list -- "left_hashes.txt". Field separator: ":"

https://paste.hashkiller.co.uk/kQ99u_WgEeiA_0CNXEjIzQ


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Mon, 12 Nov 2018 @ 10:30:11

Reading contents of file PMKID.
The columns are the following (PMKID*MAC AP*MAC Station*ESSID -- all hex encoded):
a5eb82aa24792483ce26ea5d6189e442*2c4d5483d610*f0a225a05e8b*4272656e647a73616b

Command:

1.) Preferred solution with "whoismac" - show more info:

"for i in $(cat PMKID); do whoismac -p $i; done"

2.) with "awk" - show only SSID:

"awk -F* '{print $4}' PMKID | while read l; do xxd -r -p <<<$l; echo; done"


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
pasnger57

Status: n/a
Joined: Tue, 11 Sep 2018
Posts: 84
Team:
Reputation: 64 Reputation
Offline
Mon, 12 Nov 2018 @ 17:33:10

i have a set of lists one with good Pas Phrases such as

turn off keyboard lights
gen gregory feest
clare novaes
soterro coco
love is my religion i could die for it

but i like to use a rule to Omit the spaces on the line so thay woud look like this

turnoffkeyboardlights
gengregoryfeest
clarenovaes
soterrococo
loveismyreligionicoulddieforit

i just don't know of way to go about it


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Mon, 12 Nov 2018 @ 17:42:51

pasnger57 said:

i have a set of lists one with good Pas Phrases such as

but i like to use a rule to Omit the spaces on the line so thay woud look like this

turnoffkeyboardlights
gengregoryfeest
clarenovaes
soterrococo
loveismyreligionicoulddieforit

i just don't know of way to go about it

It's easy with "sed" and "RegEx".

Code:
"sed -r 's/\s*//g' words_with_spaces.txt >words_without_spaces.txt"


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
Milzo
Administrator
Status: Elite
Joined: Sat, 29 Dec 2012
Posts: 3115
Team:
Reputation: 4844 Reputation
Online
Mon, 12 Nov 2018 @ 17:45:56

purge rule, insert a space after @ symbol

@[space] << not a literal string


1CrqbgYU63zfLjwKVagyiTYP9XGMgyFAVm

Forum Rules
Scammer Tracker - https://i-disclose.net/o/scamtracker.php
XMPP - milzo@xmpp.jp

Avatar
pasnger57

Status: n/a
Joined: Tue, 11 Sep 2018
Posts: 84
Team:
Reputation: 64 Reputation
Offline
Mon, 12 Nov 2018 @ 17:54:51

Milzo said:

purge rule, insert a space after @ symbol

@[space] << not a literal string


THANKYOU

always something simple that eludes us


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Tue, 13 Nov 2018 @ 10:49:46

1.: Convert "test.cap" file to "test_converted.hccapx".

Code:
"hcxpcaptool test.cap -o test_converted.hccapx"

start reading from test.cap

summary:
--------
file name....................: test.cap
file type....................: pcap 2.4
file hardware information....: unknown
file os information..........: unknown
file application information.: unknown
network type.................: DLT_IEEE802_11 (105)
endianess....................: little endian
read errors..................: flawless
packets inside...............: 3
skipped packets..............: 0
packets with GPS data........: 0
packets with FCS.............: 0
beacons (with ESSID inside)..: 1
EAPOL packets................: 2
best handshakes..............: 1 (ap-less: 0)

1 handshake(s) written to test_converted.hccapx

2.: Convert "test_converted.hccapx" to "test.cap"

Code:
"wlanhcx2cap -i test_converted.hccapx -o test.cap"


1 records read from test_converted.hccapx
1 handshake written to single cap file
0 handshakes not written (‎irreversible messagepair)


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
pasnger57

Status: n/a
Joined: Tue, 11 Sep 2018
Posts: 84
Team:
Reputation: 64 Reputation
Offline
Tue, 13 Nov 2018 @ 13:08:19

I Like this thread .... hope you don't think im trying to hijack it but its a good ..... so in with it's spirit in mind ....
TIP of the day
Having HUGE words lists are Grate but Cost HDD space to rectify that .ruls for hashcat are the BEST solution
in my exp. i have found the Rules OMIT @ , reverse r , Duplicate d to be the TOP 3 things PPL to do a word for choosing a password

basic example (i know i do not have a good example for omit read above for example) my all time favorite crack pw cam from the reverse rule whit robert_pliskin to nikslilp_trebor


dog
cat
green

god
tac
neerg

dogdog
godgod
greengreen


and now my list of 3 is 9


Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Wed, 14 Nov 2018 @ 12:53:04

Convert hashes to the right format.
Input: salt,hash
Output: hash:salt

root@HELIUM-XR2:~/test# cat raw_hashes.txt

oAZkAse75vY3DUyTwXhW*K$wqoWNvN,ae6a26879f684db2737173fecf6b9199ac5ed5ec0d1b66ac9474ec5fb794fc55
3ZIdz2V538b@L36c@Ces%MWKvkyXri,27aa7b56ecf8f93f72961bddc4a121ce4f251dc3a3ece660f351a88d777ec43d


Code:
"sed -n "s/\(.*\),\([a-f0-9]*\)/\2:\1/p" raw_hashes.txt "

ae6a26879f684db2737173fecf6b9199ac5ed5ec0d1b66ac9474ec5fb794fc55:oAZkAse75vY3DUyTwXhW*K$wqoWNvN
27aa7b56ecf8f93f72961bddc4a121ce4f251dc3a3ece660f351a88d777ec43d:3ZIdz2V538b@L36c@Ces%MWKvkyXri

Code:
" awk 'BEGIN{FS=","; OFS=":"} { print $2, $1 }' raw_hashes.txt "

ae6a26879f684db2737173fecf6b9199ac5ed5ec0d1b66ac9474ec5fb794fc55:oAZkAse75vY3DUyTwXhW*K$wqoWNvN
27aa7b56ecf8f93f72961bddc4a121ce4f251dc3a3ece660f351a88d777ec43d:3ZIdz2V538b@L36c@Ces%MWKvkyXri


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Thu, 15 Nov 2018 @ 07:03:29

Common hash algorithm in RegEx Format:

md4
(^[0-9a-fA-F]{32}$)

md5
(^[0-9a-fA-F]{32}$)

md5($pass,$salt)
(^[0-9a-fA-F]{32}\:.{1,}$)

md5($salt,$pass)
(^[0-9a-fA-F]{32}\:.{1,}$)

more...


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Fri, 16 Nov 2018 @ 10:13:05

hcxpsktool calculates candidates for hashcat based on commandline input, hccapx file and/or 16800 hash file.

usage..: wlanhcx2psk options

example: wlanhcx2psk -i hccapx -W -s | hashcat -m 2500 hccapx

for PMKID file:

"hcxpsktool -z PMKID.txt --weakpass --wpskeys | hashcat -O -m 16800 PMKID.txt"

for hccapx file:

"hcxpsktool - i handshake.hccapx -weakpass --wpskeys | hashcat -O -m 2500 handshake.hccapx"

Options



If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sat, 17 Nov 2018 @ 11:17:26

hashID is a tool written in Python 3 useful to identify the different types of hashes used to encrypt data and passwords. It supports the identification of over 220 unique hash types using regular expressions and it is able to identify a single hash.
The tool is the natural replacement to other similar tools like hash-identifier, which is outdated, and the original HashTag — Password Hash Type Identification (Identify Hashes), which is even older.

Command:

"hashid '422363b0e2f7feadca7517199d784a89' -m"

Analyzing '422363b0e2f7feadca7517199d784a89'
[+] MD2
[+] MD5 [Hashcat Mode: 0]
[+] MD4 [Hashcat Mode: 900]
[+] Double MD5 [Hashcat Mode: 2600]
[+] LM [Hashcat Mode: 3000]
[+] RIPEMD-128
[+] Haval-128
[+] Tiger-128
[+] Skein-256(128)
[+] Skein-512(128)
[+] Lotus Notes/Domino 5 [Hashcat Mode: 8600]
[+] Skype [Hashcat Mode: 23]
[+] Snefru-128
[+] NTLM [Hashcat Mode: 1000]
[+] Domain Cached Credentials [Hashcat Mode: 1100]
[+] Domain Cached Credentials 2 [Hashcat Mode: 2100]
[+] DNSSEC(NSEC3) [Hashcat Mode: 8300]
[+] RAdmin v2.x [Hashcat Mode: 9900]


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sun, 18 Nov 2018 @ 09:14:22

Concatenate multiple individual .hccapx files.

Command:

"cat hanshake1.hccapx hanshake2.hccapx hanshake3.hccapx >multiple_handshakes.hccapx"

Details

Useful link: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_crack_multiple_wpa_handshakes_at_once


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Mon, 19 Nov 2018 @ 12:59:57

Create word file from a book/web page.

Command:

"sed -r -e 's/\W\B|\s/\n/g;s/.*/\L&/' input.txt | sort -u > words.txt"
"perl -lne 'map {$s{lc $_}++ if $_} split /\W+/; END{print for sort keys %s}' input.txt >words.txt"

Graphical tool for custom wordlist generation "Mentalist"
Creating custom word lists spidering a targets website and collecting unique words "CeWL - Custom Word List generator"


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Tue, 20 Nov 2018 @ 13:00:27

Convert base64 back to md5.

Code:
"echo 4G5qc2WQzGES6QkWAUgl5w== | base64 -d - | xxd -ps"

e06e6a736590cc6112e90916014825e7


And if you want to automate whole thing, use syntax like that:

Code:
"while read line; do echo ${line} | base64 -d - | xxd -ps ; done < b64.txt"


Where b64.txt file contains all of your base64-encoded data:

Code:
"cat b64.txt"

4G5qc2WQzGES6QkWAUgl5w==
P9tKxonBOg3ymr8vOBLnDA==
Lk7X7MxDgnJB8Q2Ara4wgQ==


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Wed, 21 Nov 2018 @ 18:33:38

Find passwords of Edmodo hashes. MDXFind is able to do it.

Note: of an Edmondo hash (algo: Bcrypt(md5($pass))) we have to delete a char every 2 for the first 65 chars and then append the rest in order to get a valid string. Length should be 60 chars.

Original:
$826y4$31226$dZbD2JfjeZ3TbIe44M0zclck2O4T1l8j7Y7jfl6maZ2ecU900ObFJk9iz8iCE5AODPQx4QkiQjJOVmG
$826y4$31226$dObG2MfyeO3TbYew4M0jcgc42M4D1A837Z7Dfg60aO2.cn9n0dbLTywGnOGmVfGO2whcLYnYCPWkRrK
$826y4$31226$dYb22Uf3eY3jbEe34O0DcBcm2M4D1d8h7M7jfA65aM2.cE9B0mbHqwJJXyEQq8tuyKNaynxwrXGD65C
$826y4$31226$dMbj2RfmeM3GbJej4O0TcYc52N4W1U8y7N7mfJ6jaZ2.cN9n0Wb4XGh1Z6pprH2h7Iwm43iVzZjozB6
$826y4$31226$dYbz2NfheO3GbZem4Z0jcccy2M421Y8w7Y7zfZ6iaN2.cY9k0qbmQal.22hZvum3RuYgYbTd/xfHYgG

Correct format:
$2y$12$ZDJjZTI4MzlkOTljYjlmZeU0OFJk9iz8iCE5AODPQx4QkiQjJOVmG
$2y$12$OGMyOTYwMjg4MDA3ZDg0O.nndLTywGnOGmVfGO2whcLYnYCPWkRrK
$2y$12$Y2U3YjE3ODBmMDdhMjA5M.EBmHqwJJXyEQq8tuyKNaynxwrXGD65C
$2y$12$MjRmMGJjOTY5NWUyNmJjZ.NnW4XGh1Z6pprH2h7Iwm43iVzZjozB6
$2y$12$YzNhOGZmZjcyM2YwYzZiN.YkqmQal.22hZvum3RuYgYbTd/xfHYgG

"expr length '$2y$12$NmRmMzM4YmNiMDIwYjY3O.t7udSNap87AnPPtjofQ.jqGHnF/0Mgm'"
60

MDXFind Parameters

Command:

./mdxfind -h ^bcryptmd5$ -f hashlist wordlist >> found.txt


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Thu, 22 Nov 2018 @ 20:36:57

Strip particular handshake (by SSID) using wlanhcx2ssid from captured handshakes by hcxdumptool.

List captured handshakes (hcxdump.hccapx): "wlanhcxinfo -i hcxdump.hccapx -a -s -e -p"

Output format: (MAC AP: MAC station: message pair:SSID)

704f57966e24:9c207ba9ab5c:10:TP-Link_6A24
c04a004a6758:a06faa10ba48:10:TP-LINK_4A5758
000e226ab7b0:1008c15f9559:10:Terminator987

Strip SSID "Terminator987" from hcxdump.hccapx: "wlanhcx2ssid -i hcxdump.hccapx -X Terminator987"

4 records read from hcxdump.hccapx
2 records written

Output:
Terminator987.hccapx


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sat, 24 Nov 2018 @ 13:32:11

Hashcat Benchmarks Comparison

https://github.com/siseci/hashcat-benchmark-comparison
https://gist.github.com/epixoip?direction=asc&sort=updated


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sun, 25 Nov 2018 @ 23:07:05

Search 7 chars length password candidates contains "edina" in rockyou.txt

Command: "perl -ne 'print if /^(?=.*edina)\w{7}$/' /usr/share/wordlists/rockyou.txt "

Output:

medina1
enedina
medinas
medina7
medina2
medina3
medinah
medina4
jmedina
emedina
....


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Mon, 26 Nov 2018 @ 20:34:39

"People always make the best exploits. I've never found it hard to hack most people. If you listen to them, watch them, their vulnerabilities are like a neon sign screwed into their heads."
Elliot Alderson


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Tue, 27 Nov 2018 @ 18:54:35

InsidePro Hash Finder is 3 years old.

Statistics over the years

Hashes checked: 48 216 216 100
Hashes found: 20 247 515 595 (41.99%)

Total hashes in the DB: 2 659 083 176


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Fri, 30 Nov 2018 @ 10:41:53

Remove carriage return on GNU/Unix

"tr -d '\r' >somefile"
or
"sed 's/\r$//' input > output"
or
"dos2unix input"
or
"perl -i -pe 's/\r//' filename"

Next day: crack 8track hashes


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sat, 01 Dec 2018 @ 11:23:22

Background:"MUSIC STREAMING SERVICE 8tracks has been the latest victim of a cyberattack in 2017, with the loss of 'millions' of customer details.
..
Users signing up with either Google or Facebook don't need to worry at all. Those who have signed up directly have very little personal information at risk and even changing the password can be considered as a precaution."

Attack:

algo: SHA-1('--'.$salt.'--'.$pass.'--')
You can run 8track hashes with hashcat 4.0+ .

1. Convert them to this format hash:--salt--
2. Run them as -m 120 with $-$- rule or create a 8tracks.rule file with content only 1 row: $- $-
3. In case you wanted to check only passwords shorter than 9 characters in exchange for higher speeds then add -O parameter

Examples:
hashcat -O -m 120 -a 0 8tracks_hashes dictionary -r best64.rule -r 8tracks.rule
or

hashcat -O -m 120 -a 0 8tracks_hashes dictionray -r 8tracks.rule
or

hashcat -O -m 120 -a 0 8tracks_hashes -j '$-$-' dictionary

8tracks_hashes format for hashcat:

14a3dd63ea16bf75e78d5a2af882025f6030de81:--b97b64ec9a5f171b700101062418349281e88d63--
7299c4d79b2feb9670eb0356a2eca76959527fd5:--a6e85f488463684d021c132d2cef4e7b14e0bef4--
4a35b41357feafb9b829ff9b3e02b382b3005033:--4cdc09482ae4e82d99d86698c30caa09226b835a--
6d945e4b06df459a5fc553ac26cc3abbe3fa52fc:--c3ba7ffba8a5413bf7e90c38062fb992e68726a9--
459f7a22195099f16586b66b5f30d54785db46ca:--72f11b0474861c74636a907873293959aa3a8f21--
a2e4a18a65a027dc365d720d51630464e06d85fa:--6386097507781c8b62147958aa9805f35f478a59--
a4d4e3d7ddb01e6e73ea75f3c34870ee0166fb72:--f5ca244bddc387786c5013bc331b472d04757373--
9ae0f675f0f1ef4fde857317474699b7753ad2fb:--16dec0f0e9d36d9d4b939849178f2a246f3ab1b4--

Note: Users are advised to change passwords to be on the safe side, not to use the same password on every site and, wherever possible, to use two-factor authentication such as an Authenticator.


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Mon, 03 Dec 2018 @ 17:32:14

Generate bcrypt hashes with python3.x
Maximum Password Length: The bcrypt algorithm only handles passwords up to 72 characters, any charactersbeyond that are ignored.

root@Helium-XR02:~/python-test# python3.7
Python 3.7.1 (default, Oct 21 2018, 08:03:53)
[GCC 8.2.0] on linux
Type "help", "copyright", "credits" or "license" for more information.

>>> import bcrypt
>>> password = b'My_password'

Generate bcrypt hash with a randomly-generated salt:

>>> hashed_password = bcrypt.hashpw(password, bcrypt.gensalt())

>>> print(hashed_password)
b'$2b$12$NWZBQrPrDlS5ABEeveWbI.fwfYxCyX4eCH27.pmpNyUAqITW0gsEm'

Generate bcrypt hash with cost parameter 14:

>>> hashed_password_round14 = bcrypt.hashpw(password, bcrypt.gensalt(14))
>>> print(hashed_password_round14)

b'$2b$14$ZrhZh3RKz1m9aZHhfLQuGenuFULPiclBSDncTFzyVoJ9aiRtbPqcO'


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Tue, 04 Dec 2018 @ 05:37:28

Remove backslash from protected slash \/ -- ( change "\/" to "/"

Example hashes (wordpress.txt):

Code:
$P$DuOxmeTb7uGqNkkzenh6BqBu5OmpDF\/
$P$DPUN9ULZv9ICq.o53w4Kk\/685Q7mdW0
$P$DbHTs7pYRbB4s5sHzXh\/JK7kFa4SIT0

Output:

Code:
$P$DuOxmeTb7uGqNkkzenh6BqBu5OmpDF/
$P$DPUN9ULZv9ICq.o53w4Kk/685Q7mdW0
$P$DbHTs7pYRbB4s5sHzXh/JK7kFa4SIT0

Commands:

Code:
sed -E 's/\\\//\//g' wordpress.txt
tr -d "\\" <wordpress.txt
sed -E 's/\\//g' wordpress.txt
sed -E 's!\\/!/!g' wordpress.txt
awk '{gsub (/\\/, ""); print $0}' wordpress.txt     
awk 'NF{gsub (/\\/,""); print $0}' wordpress.txt 


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Sat, 08 Dec 2018 @ 12:34:22

Cracking MS Office document password using Hashcat.

In order to use Hashcat to attack the hash stored in a Microsoft Office document, we first must extract the hash. There’s a Python script called office2john.py for this.

Install JohnTheRipper or simple download office2john.py
chmod a+x office2john.py
./office2john.py test_file.docx > office_hash.txt

cat office_hash.txt
test_file.docx:$office$*2010*100000*128*16*865b81ea364685eb4a6d539900ec4bdd*dcb1e2ea2206012e99247fd6da80bbcc*b544251140aab3f213899fd9e9702643884cedc184f4b7d8a2617aa1fe554a92

Edit the office_hash.txt and remove the filename (we need only the hash)
Hashcat modes and hash format can be found here.

Other method (online): https://www.onlinehashcrack.com/office2john



If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
Tue, 11 Dec 2018 @ 10:42:45

Advice Against Scammers.

1. Read the Rules For Paid Password Recovery
2. Official communication channel is here on the forum.
3. Before payment, always ask for the hashes to be verified via InsidePro Hash-Verifier.
4. Do not pay a cracker until either a moderator or an admin has verified the found hashes.


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp

Avatar
freeroute
Moderator
Status: Trusted
Joined: Sat, 16 Jul 2016
Posts: 2346
Team:
Reputation: 7915 Reputation
Online
7 days ago

When cracking WPA/WPA2 passwords, make sure you check gpuhash.me first incase it's already been processed.

General Rules

15). Do NOT use other online services like gpuhash.me and then try to obtain the password / key for free here at HashKiller, (instant ban if you do). If gpuhash.me failed to find the key, then its OK to post here at HashKiller. Crackers also should respect the rule and make checks before posting passwords.

How-to:

https://gpuhash.me/BSSID or an alternative: https://gpuhash.me/112233445566 (BSSID without semicolons)

for example: https://gpuhash.me/11:22:33:44:55:66 or https://gpuhash.me/112233445566

BSSID in PMKID hash:

The columns are the following (PMKID*MAC AP*MAC Station*ESSID -- all hex encoded):
a5eb82aa24782483ce26ea5d6189e442*2f4d5483d610*f0a225b05e8b*4272656e647a73616b

PMKID check on gpuhash.me: https://gpuhash.me/2f4d5483d610


If I helped a +rep is appreciated!

: 13hDMK85KhVnPb2eTFBacHD6kDjKYFLudb
XMPP: freeroute@xmpp.jp


40 Results - Page 1 of 2 -
1 2

We have a total of 163685 messages in 20542 topics.
We have a total of 19308 registered users.
Our newest registered member is WeeJobbieMilzo.