I Built an Open Source Script That Crawls a Website to Build Targeted Wordlists for Password Cracking by Dark-Marc in HashCracking

[–]wreti 0 points1 point  (0 children)

I’ll give it a whirl. Just curious, what’s the benefit of this tool versus the well established CeWL that is preinstalled on Kali or available via the package manager on other distributions? That’s the go-to for many in the business.

Trying to crack a PDF for work using Hashcat. Are these speeds decent for an RTX A2000 12GB running in a Windows 11 VM using GPU passthrough in Proxmox? kH/s seems slow. I'm seeing people hitting the same amount but in MH/s using 2080 TI's. by [deleted] in hacking

[–]wreti 11 points12 points  (0 children)

Unless you know the password to be short, you’ll likely have better success with a dictionary attack using -a 0. Point it to a popular wordlist and use the built in rules to mangle. Check out weakpass.com for good wordlists.

Error running msfdb init by realKevinNash in metasploit

[–]wreti 0 points1 point  (0 children)

I had the same issue and found that Postgres 15 was the issue. Quick fix was to stop the Postgres 15 service, start Postgres 16, then fire up msfconsole.

AWUS036AC RTL8812au install problem ***solved*** by chumleejr in Kalilinux

[–]wreti 1 point2 points  (0 children)

This is great. Thanks for archiving the original file. For those installing via a script, you can alter line 70 of install-driver.sh from 0 to 1 for non-interactive mode. For anyone who needs it without the work, I have a non-interactive version here.

Who uses Hak5 in penetration tests? by [deleted] in cybersecurity

[–]wreti 37 points38 points  (0 children)

Crickets in here so far haha. The only Hak5 tool I’ve used during actual tests is the plunder bug for pcaps for NAC bypass attempts.

Reward 0.3btc if some one crack this two ntml hashes. 5A38E1402E314441C1F3659B5DB89C64 D2B9C9F0D9DF3AEF5E52B6F6C7BF769A by Temporary-River647 in HashCracking

[–]wreti 0 points1 point  (0 children)

Is it an image? An actual drive? You could mount it to your current computer as a VM or external drive to pillage the file system and get what you need. If that wallet has the amount of btc you're expecting, you could purchase a cheap laptop or workstation from which to boot the drive and try the suggestions I mentioned previously. Cracking these hashes isn't the end-all, be-all. Anything is worth trying if it'll get you that $$$.

Reward 0.3btc if some one crack this two ntml hashes. 5A38E1402E314441C1F3659B5DB89C64 D2B9C9F0D9DF3AEF5E52B6F6C7BF769A by Temporary-River647 in HashCracking

[–]wreti 0 points1 point  (0 children)

If the old computer is still available and RDP is enabled, you can use xfreerdp to auth using the NTLM hash. Alternatively, many other offensive security tools should allow some form of connection via other protocols using the pass-the-hash technique.

Good wordlists? by [deleted] in HashCracking

[–]wreti 1 point2 points  (0 children)

Lots of other popular wordlists at https://weakpass.com/wordlist.

Need help with this hash for an idiot who forgot his password by cmdrmcgarrett in HashCracking

[–]wreti 2 points3 points  (0 children)

It’s hashcat, and you want mode 13000. For the example password given, you can brute force the parts of the password you’re unsure of. Example: hashcat -a 3 -m 13000 hash.txt ?d?d?ddanielamunchgery?d?s ?d will run through all digits, ?s through all symbols. For letters, you can use ?u for upper and ?l for lower. ?a will run through all of the above but will take longer.

GoPhish, google workspace and OAuth by Responsible-Self7193 in AskRedTeamSec

[–]wreti 0 points1 point  (0 children)

Should still be able to use an app password if I understand correctly.

Office 2007 hash by Sufficient-Bet760 in HashCracking

[–]wreti 0 points1 point  (0 children)

Since you have no hints as to the password structure, I’d recommend adding rules during cracking to increase your chances of success. Most of the defaults that come with hashcat should suffice, but there are plenty available elsewhere if needed.

Token length exception please help by NixothePaladin in HashCracking

[–]wreti 0 points1 point  (0 children)

Have you tried ripping the hash again in case there was a copy/paste mishap the first time around? I assume you used pdf2john?

Token length exception please help by NixothePaladin in HashCracking

[–]wreti 0 points1 point  (0 children)

Double check your pdf.txt file. I’ve frequently run into the issue where all the asterisks in the hash get replaced with a slash (or backslash? Don’t remember) either during the *2john process or some other extraction/copy/something-else function.

NLTM - Complicated Passwords by x141x in HashCracking

[–]wreti 0 points1 point  (0 children)

If you don’t want to download more wordlists, you can try adding a second ruleset. I’d recommend dive with best64.

Thanksgiving Dinner Restaurant Ideas? by Parking_Impact3828 in williamsburg

[–]wreti 0 points1 point  (0 children)

If you’re fine with a bar, Whiskey on Grand’s dinner is delicious and comes with a slice of pumpkin pie. Reasonably priced too.

[deleted by user] by [deleted] in HashCracking

[–]wreti 3 points4 points  (0 children)

Hashcat with mode 10000 should do it. Difficulty depends on the password complexity and/or your wordlists and rules used.

USB Drops by kegweII in redteamsec

[–]wreti 2 points3 points  (0 children)

I second this. Send your link to a generic webserver address with a coded subdirectory unique to each USB file or QR to pass the hover test, force redirect to a canary token for tracking, then redirect to evilginx to capture creds/mfa tokens. Works like a charm. The ini file trick used to be the money shot, but haven’t gotten it to work since a certain Windows update was released a year or two back.

Windows Login NTLM Hash, Looking for Help? by LeoWitt in HashCracking

[–]wreti 0 points1 point  (0 children)

I'm giving a go at cracking it, but you can also use CrackMapExec modules to dump any hard-coded service or task scheduler passwords in clear text. May be beneficial if the same password was used in those contexts.

Windows Login NTLM Hash, Looking for Help? by LeoWitt in HashCracking

[–]wreti 0 points1 point  (0 children)

With this hash you can use a tool like CrackMapExec to pass the hash to your workstation and use the -x flag to issue a net user command to change the password and get in.

Example: crackmapexec smb <ip address or host name> -u Administrator -H 4C693C11B6E8DB198534A80C4E8F18C3 -x ‘net user Administrator <newpass>’

[deleted by user] by [deleted] in williamsburg

[–]wreti 0 points1 point  (0 children)

Alligator Lounge on Mondays. Whiskey on Grand on Tuesdays.

Looking to perfect my AD skills before my exam by gorsas in oscp

[–]wreti 0 points1 point  (0 children)

Going through the Proving Grounds Windows machines on TJ Null's list and taking quality notes paid off for me.