Questions tagged [Bruteforce] (42)

2
answers

The best way to make brute force AES, through Python?

Greetings, great and not so, the minds of Habra. To thebrotherkite value is encrypted in AES 256. Presumably, the key may be the MD5 hash of 5 characters(Latin alphabet in both upper and lower case, numbers from 0 to 9 and special characters _-+=). Tried myself to write bruteforcer, in Python(I Know, not the fastest, but th...
Nico83 asked April 8th 20 at 17:49
2
answers

Forgot password VeraCrypt container. How can I make a dictionary?

Forgot password cryptocotylar, which had not opened, but any idea what phrase to use in the password and the character combinations, but to iterate through them manually a lot. How can I make a dictionary that combination of words was compiled in a different order? Are there any utilities? Still rummage a little in Python, ...
genevieve asked April 4th 20 at 12:21
4
answers

Need to find the cause of the brute force of passwords from my server?

Received a letter from the provider that my server is brute force on the wrong subnet. Can't find the cause. In processes of anything suspicious is not present. Avtozavodsky crontab and checked. Checked all the projects on the server everything seems OK. Checked the server using rkhunter. Monitor the network interface using...
Diego21 asked April 4th 20 at 01:49
1
answer

Specify a password using brute force, why not the same result?

Task: you have zaporoleny zip archive. In the archive lyricist, it is a number from 0 to 99'999. The password consists of 12 characters, first of them are exactly the figure, 11 the rest is a combination from the set 0-9, a-f. Only lower case. Using brute force I figured out the password - 005078bafbe0. The archive was open...
rafael_Hills asked April 3rd 20 at 18:05
0
answer

Anyone can help to othermetal Keepass?

Guys, I forgot part of a complex password to the database Keepas 2. Who can help with the selection of the password on Hashcat? Owners of powerful graphics cards, respond, please. The search time - a few minutes. The main part of the password is known, it remains to find the remaining few characters. Hash and mask to search...
kimberl asked April 2nd 20 at 17:04
5
answers

What PL is it possible to hack VK page?

GOOD AFTERNOON.just say that everything I do is for encyclopedic knowledge. I know the penalty for hacking,but wanted to ask if it was possible for a brute force password hack VC. I also know about the hashes and so forth But I am interested-is it possible. If not, then how is it done,in addition to socio traps of all sorts...
Antoinette.Bogan asked March 31st 20 at 21:07
1
answer

How to make a mask for selection in Hashcat?

Good morning. How to make a mask of the "Only big letters, small and numbers"? You need to be able to with increment, i.e. I currently usehashcat64 -m 0-a 3-i --increment-min=1 --increment-max=1 <HASH> ?a hashcat64 -m 0-a 3-i --increment-min=2 --increment-max=2 <HASH> ?a?a hashcat64 -m 0-a 3-i --increment-min=3 ...
dorian_Schroeder56 asked March 31st 20 at 14:51
1
answer

How to check the file phones on the existence of accounts in compliance?

The details in the header. It is desirable that soft but you can site.
Preston_Turn asked March 30th 20 at 00:40
0
answer

Hashcat, a combinatorial dictionary attack?

There is a dictionary with English words, here's an example: a aa aab May assetswith the dictionary as follows: слово1_слово2, for example: a_a, a_aa, a_aab, aa_a, etc.
Xzavier.Turcotte asked March 30th 20 at 00:34
1
answer

How to optimize the script iterate through a hash with salt?

Good time of day. A hash string is created in PHP with the following structure:<?php $hashed = hash('sha512', env('SALT') . $string); This hash string is stored in the database and for subsequent validation works fine (the usual comparison of the hash). But there was a minor hiccup and needed to know what kind of string...
elisa41 asked March 29th 20 at 21:38