e011bf2098 | ||
---|---|---|
ntds | ||
.gitignore | ||
LICENSE | ||
README.md | ||
google_colab_hashcat.ipynb |
README.md
Nephelees
Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also ntds cracking tool abusing Google Colab
V1 - Google Colab
- https://github.com/ShutdownRepo/hashonymize
- https://github.com/ShutdownRepo/google-colab-hashcat
- https://github.com/mxrch/penglab
- https://colab.research.google.com/drive/1arm1_HEMb868mk18FlLkEcqvHPB_Ibgb#scrollTo=lWPQqb3oETLd
Go on : https://colab.research.google.com/github/mxrch/penglab/blob/master/penglab.ipynb
Select "Runtime", "Change runtime type", and set "Hardware accelerator" to GPU.
Change the config by setting "True" at tools you want to install.
Select "Runtime" and "Run all" !
- markov, keyboard walking, dico + rules , haveibeenpwn
- reuse old pot (extract passwd to new wordlist)
Here are some of the most used attack modes for the --attack-mode
option
0 Wordlist (with or without rules)
3 Pure bruteforce
Here are some of the most used hash types for the --hash-type
option
1000 NTLM (actually its for NT hashes)
3000 LM
5500 Net-NTLMv1 (actually, it should be called NTLMv1)
5600 Net-NTLMv2 (actually, it should be called NTLMv2)
13100 Kerberoast
18200 ASREProast
22000 WPA-PBKDF2-PMKID+EAPOL
16800 WPA-PMKID-PBKDF2
0 md5
100 sha1
1400 sha2-256
1700 sha2-512
# 2 hours
-a 3 -1 ?l?d?u ?1?1?1?1?1?1?1?1