mpgn Profile picture
Apr 6, 2020 5 tweets 3 min read Read on X
How to defeat Hashcat !? 🛡️ Well, I think I found a workaround😈

Use a password with the following format :

⚔️ '$HEX[xxxx]' ⚔️ (where xxxx are only hex characters)

Unless a specific flag is added to hashcat, the attacker will never be able to crack it ! #hashcat

1/5⬇️⬇️⬇️ Image
As you can see on the screenshot, the🚩'--wordlist-autohex-disable' needs to be added to hashcat to crack this pwd👻

This issue is already known by the hashcat team as you can see on Github and called an "hexception" 😆

github.com/hashcat/hashca…

2/5⬇️⬇️⬇️ Image
But why Hashcat failed to crack the password w/s🚩?

When a pwd contains a mixture of bytes outside 0x20-0x80, HC converts it as hex using this format $HEX[xxxx].

Using this, Hashcat can makes a diff between a plaintext pwd using only hex chars and the encoded one 🦾

3/5⬇️⬇️
But wait, when Hashcat try to read your l33t password "$HEX[DEADBEEF]", he thinks it's an encoded one and not a plaintext password following his own logic !

And this is why without the flag ''--wordlist-autohex-disable" he cannot crack it ! 😈

4/5⬇️⬇️
Now let's check how you can configure KeePass⛏️ to automate this process :

1⃣ Go to Tools -> Generate Password
2⃣ Select "Generate using Pattern"
3⃣ Add this pattern '$\HEX\[h{30}\]'
4⃣ Don't forget to save the profile
5⃣ Go to Preview tab to check

That all I have for today !✌️ ImageImage

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with mpgn

mpgn Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @mpgn_x64

Feb 20, 2023
It's 2023, CrackMapExec can now dump DPAPI credentials as a core feature !🚀

This is possible thanks to the work of @_zblurx and his library dploot ! He also added a module to dump firefox passwords 🔥

Pushed on @porchetta_ind v5.4.5 Bruce Wayne 🪂

No excuse, DA everytime, 🔽
But wait, yet yet another dpapi dumping tool ?
Well @_zblurx has fully embraced the concept of CME and taken leverage of cmedb !

Everytime you found a valid credential, CME will add this cred in his own DB, CMEDB 🧙‍♂️

Now why this is important in the case of dpapi credentials ?🔽
When using the option --dpapi (you need to be local adm), CrackMapExec will feed dploot lib with every credentials you already found during your internal pentest ! 🔥

Let me explain with a simple example 🔽
Read 7 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(