mpgn Profile picture
Flibustier du net ̿ ̿̿'̿'\̵͇̿̿\=(•̪●)=/̵͇̿̿/'̿̿ ̿ ̿ ̿ Podcast Hack'n Speak @hacknspeak / https://t.co/GyACSFg9mw

Apr 6, 2020, 5 tweets

How to defeat Hashcat !? 🛡️ Well, I think I found a workaround😈

Use a password with the following format :

⚔️ '$HEX[xxxx]' ⚔️ (where xxxx are only hex characters)

Unless a specific flag is added to hashcat, the attacker will never be able to crack it ! #hashcat

1/5⬇️⬇️⬇️

As you can see on the screenshot, the🚩'--wordlist-autohex-disable' needs to be added to hashcat to crack this pwd👻

This issue is already known by the hashcat team as you can see on Github and called an "hexception" 😆

github.com/hashcat/hashca…

2/5⬇️⬇️⬇️

But why Hashcat failed to crack the password w/s🚩?

When a pwd contains a mixture of bytes outside 0x20-0x80, HC converts it as hex using this format $HEX[xxxx].

Using this, Hashcat can makes a diff between a plaintext pwd using only hex chars and the encoded one 🦾

3/5⬇️⬇️

But wait, when Hashcat try to read your l33t password "$HEX[DEADBEEF]", he thinks it's an encoded one and not a plaintext password following his own logic !

And this is why without the flag ''--wordlist-autohex-disable" he cannot crack it ! 😈

4/5⬇️⬇️

Now let's check how you can configure KeePass⛏️ to automate this process :

1⃣ Go to Tools -> Generate Password
2⃣ Select "Generate using Pattern"
3⃣ Add this pattern '$\HEX\[h{30}\]'
4⃣ Don't forget to save the profile
5⃣ Go to Preview tab to check

That all I have for today !✌️

Share this Scrolly Tale with your friends.

A Scrolly Tale is a new way to read Twitter threads with a more visually immersive experience.
Discover more beautiful Scrolly Tales like this.

Keep scrolling