Skip to content
  • Categories
  • Recent
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Slate)
  • No Skin
Collapse
Brand Logo

hashpwn

Home | Donate | GitHub | Matrix Chat | PrivateBin | Rules

  1. Home
  2. Resources
  3. Pro Tips

Pro Tips

Scheduled Pinned Locked Moved Resources
jtr
13 Posts 3 Posters 957 Views 3 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • freerouteF Offline
    freerouteF Offline
    freeroute
    Moderator Trusted
    wrote on last edited by
    #4

    Information about hashes formats
    Information_about_hashes_formats.txt

    1 Reply Last reply
    👍
    0
    • freerouteF Offline
      freerouteF Offline
      freeroute
      Moderator Trusted
      wrote on last edited by freeroute
      #5

      Title: Analyze and create rules for large hashlists
      Author: hashcat's developers
      URL: https://hashcat.net/wiki/doku.php?id=hashcat
      Description: Analyze and create rules for large hashlists. In some cases, this could be useful.

      Command: hashcat -m 0 large_hash_list wordlist -g 500000 --debug-mode=1 --debug-file=new.rule

      -g, --generate-rules | Num | Generate X random rules
      --debug-file | File | Output file for debugging rules

      • [ Rule Debugging Modes ] -

        | Format
        ===+========
        1 | Finding-Rule
        2 | Original-Word
        3 | Original-Word:Finding-Rule
        4 | Original-Word:Finding-Rule:Processed-Word
        5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

      oe3p32wedwO 1 Reply Last reply
      👍
      1
      • freerouteF Offline
        freerouteF Offline
        freeroute
        Moderator Trusted
        wrote on last edited by
        #6

        Title: What is the correct format of a Houzz hash for hashcat?
        Author: freeroute
        URL: https://paste.hashpwn.net/?56c460ef65322356#B1ZEbFB7qiZRymJUeGZp2ygV4pR8fdyxw5kmjeckhdVi
        Description: The correct format of Houzz hash for hashcat

        1 Reply Last reply
        👍
        1
        • freerouteF Offline
          freerouteF Offline
          freeroute
          Moderator Trusted
          wrote on last edited by
          #7

          Title: Check the candidates generated by hashcat rule file
          Author: freeroute
          URL: https://paste.hashpwn.net/?e695c3709b553d0f#BX9utL4md1xmvirutURJYycRvCqRncAyhstWGMYNj9Mt

          Description: Check the candidates generated by the Hashcat rule file.

          A1131A 1 Reply Last reply
          2
          • freerouteF freeroute

            Title: Check the candidates generated by hashcat rule file
            Author: freeroute
            URL: https://paste.hashpwn.net/?e695c3709b553d0f#BX9utL4md1xmvirutURJYycRvCqRncAyhstWGMYNj9Mt

            Description: Check the candidates generated by the Hashcat rule file.

            A1131A Offline
            A1131A Offline
            A1131
            Trusted
            wrote on last edited by cyclone
            #8

            @freeroute

            The above can be used with more words and rules to get a little bigger wordlist:

            echo $'word1\nword2\nw0rd3' > words.txt

            hashcat --force words.txt -r complex.rule --stdout | sort -u > candidates_words.txt

            Amateur of mycology and hashcracking | 1x3060Ti | 1x1050Ti
            PGP:4B0A386530D789157435DC7489138FB52FDD7FC1

            1 Reply Last reply
            0
            • freerouteF freeroute

              Title: Analyze and create rules for large hashlists
              Author: hashcat's developers
              URL: https://hashcat.net/wiki/doku.php?id=hashcat
              Description: Analyze and create rules for large hashlists. In some cases, this could be useful.

              Command: hashcat -m 0 large_hash_list wordlist -g 500000 --debug-mode=1 --debug-file=new.rule

              -g, --generate-rules | Num | Generate X random rules
              --debug-file | File | Output file for debugging rules

              • [ Rule Debugging Modes ] -

                | Format
                ===+========
                1 | Finding-Rule
                2 | Original-Word
                3 | Original-Word:Finding-Rule
                4 | Original-Word:Finding-Rule:Processed-Word
                5 | Original-Word:Finding-Rule:Processed-Word:Wordlist

              oe3p32wedwO Offline
              oe3p32wedwO Offline
              oe3p32wedw
              wrote on last edited by
              #9

              @freeroute wrote a script via chatgpt to analyze the debug file
              Title: python script to analyze debug rule file
              Author: ChatGPT
              Code:

              from collections import Counter
              
              # Reading data from the file
              input_file = 'new.rule'  # Path to your input file
              output_file = 'output.txt'  # Path to the output file where results will be saved
              
              # Try opening the file with a different encoding
              try:
                  with open(input_file, 'r', encoding='utf-8') as file:
                      strings = file.readlines()
              except UnicodeDecodeError:
                  with open(input_file, 'r', encoding='ISO-8859-1') as file:
                      strings = file.readlines()
              
              # Removing unnecessary spaces (e.g., newline characters)
              strings = [line.strip() for line in strings]
              
              # Counting the frequency of each line
              counter = Counter(strings)
              
              # Sorting lines by frequency (in descending order)
              sorted_strings = counter.most_common()
              
              # Writing the sorted lines and their frequency to a new file
              with open(output_file, 'w', encoding='utf-8') as file:
                  for line, count in sorted_strings:
                      file.write(f"{line} - {count}\n")
              
              print(f"Result saved in {output_file}")
              
              

              Description: Simply run specifying the received file from the hashcat. In the output you will get the rules that were used most often

              1x1660 Ti | 2x4090 | epileptic/anxiety/despair/drain | hashpwn <3

              1 Reply Last reply
              👍
              1
              • freerouteF Offline
                freerouteF Offline
                freeroute
                Moderator Trusted
                wrote on last edited by
                #10

                Title: ETH hash parameters for hashcat
                Description: For speed, don't use -w 4, add the below manually
                -n 64 -u 8 -T 1024 --force

                -n, --kernel-accel - Manual workload tuning, set outerloop step size to X
                -u, --kernel-loops - Manual workload tuning, set innerloop step size to X
                -T, --kernel-threads - Manual workload tuning, set thread count to X
                --force - Ignore warnings

                1 Reply Last reply
                👍
                0
                • freerouteF Offline
                  freerouteF Offline
                  freeroute
                  Moderator Trusted
                  wrote on last edited by cyclone
                  #11

                  Title: HTTP Digest access authentication algorithm
                  Hashcat mode: -m 11400 - SIP digest authentication (MD5)
                  Format:

                  $sip$*192.168.100.100*192.168.100.121*username*asterisk*REGISTER*sip*192.168.100.121**2b01df0b****MD5*ad0520061ca07c120d7e8ce696a6df2d
                  $sip$***Mufasa*[email protected]*GET**/dir/index.html**dcd98b7102dd2f0e8b11d0f600bfb0c093*0a4f113b*00000001*auth*MD5*6629fae49393a05397450978507c4ef1
                  
                  $sip$*[URI_SERVER]*[URI_CLIENT]*[USERNAME]*[REALM]*[METHOD]*[URI_PREFIX]*[URI_RESOURCE]*[URI_SUFFIX]*[NONCE_SERVER]*[NONCE_CLIENT]*[NONCE_COUNT]*[QOP]*[DIRECTIVE]*[MD5]
                  

                  Sources:
                  https://github.com/hashcat/hashcat/issues/1021
                  https://hashcat.net/forum/thread-7054-post-37744.html#pid37744

                  1 Reply Last reply
                  0
                  • freerouteF Offline
                    freerouteF Offline
                    freeroute
                    Moderator Trusted
                    wrote on last edited by
                    #12

                    Title:rulechef - a markov rule generator
                    Author:Cynosure Prime
                    Description:Analyses a ruleset for hashcat/mdxfind/john the ripper and iteratively generates rules based on markov chains created from the input rules. Users can specify additional parameters such as the min/max rule operations, chain probability and starting chain limits.

                    This tool was written in an attempt to craft better quality rules as opposed to the usual rule stacking or randomly generating rules.
                    Source:https://github.com/Cynosureprime/rulechef

                    1 Reply Last reply
                    👍
                    0
                    • freerouteF Offline
                      freerouteF Offline
                      freeroute
                      Moderator Trusted
                      wrote on last edited by
                      #13

                      Title: Plundering and pillaging password and passphrase plains for profit
                      Author: Will Hunt
                      Description: In this talk we'll look beyond the basics of cracking and arm you with further attacks when you feel you're out of options. We'll look at multiple paths for cracking delimited passphrases and review when you'd want to use these attacks and why. Target-specific markov tables will be shown to illustrate how you could be missing out on elusive plains without even realising it, as well as getting the best bang for your buck out of your rule-based attacks by identifying non-efficient operations. Then, after reviewing transliterated attacks and hash shucking, we'll wrap up with the release of a tool to help you automate the initial heavy lifting of your attack cycles.

                      Will Hunt
                      Will (@Stealthsploit) has been in infosec for over 15 years, co-founded In.security in 2018 and as a pentester has helped secure many organisations through technical security services and training. Will's a Black Hat trainer and has taught and spoken at several conferences and events, as well as helping run Password Village at DEFCON. Will also assists the UK government in various technical, educational and advisory capacities. Before Will was a security consultant he was an experienced digital forensics consultant and trainer.

                      Security Fest is an inspiring and unique IT security conference held in Gothenburg, Sweden. The event is an excellent opportunity to learn more about IT security, and a great way to connect with both the renowned international speakers, and the other attendees.

                      Source: https://www.youtube.com/watch?v=ArLhwcpWMdU

                      1 Reply Last reply
                      🔥
                      2
                      Reply
                      • Reply as topic
                      Log in to reply
                      • Oldest to Newest
                      • Newest to Oldest
                      • Most Votes


                      Who's Online [Full List]

                      6 users active right now (3 members and 3 guests).
                      hashpwn-bot, cyclone, bloodybunny008

                      Board Statistics

                      Our members have made a total of 4.0k posts in 150 topics.
                      We currently have 260 members registered.
                      Please welcome our newest member, iceman.
                      The most users online at one time was 49 on Thursday, December 26, 2024.

                      • Login

                      • Don't have an account? Register

                      • Login or register to search.
                      • First post
                        Last post
                      0
                      • Categories
                      • Recent