Overview for opensuse

Atom installation on openSUSE Linux: Signature verification failed error resolution

Atom is a very popular "hackable text editor for the 21st Century" not only for linux, but owners of openSUSE Linux can have problems with unsigned package while installing an .rpm package:

Error: INVALID:atom-1.46.0-0.1.x86_64(file-eca764a8): Signature verification failed [6-File is unsigned]

If you still want to install it on your openSUSE system, there's a problem resolution:

  1. Go to /etc/zypp
  2. Open file zypp.conf (as a root) and find a line # pkg_gpgcheck = unset -> according to gpgcheck.Leave this line without change :D
  3. Add following line above: pkg_gpgcheck = off
  4. Save file and exit.
  5. Install Atom .rpm package one more time. It will go without a problem.

Following this operation will switch off package signature verification and you will be able to install Atom.


Important notice

Problem with unsigned package was added to issues on official Atom github repository several years ago, but developers still didn't resolve it. Please, take this information with understanding, that Atom is being developed by a group of people, who have programmed very popular and really great text editor for several programming languages and platforms totally free.

Read more

Written by Administrator on Monday May 11, 2020

Is it possible to crack a password hashed with sha256 with hashcat? [with screenshots]

SHA256 algorithm was invented to generate 256-bit (or 32-byte) hash. They write it will take you several years to crack it. It's true, but there're cases you can brute-force it (for example, with hashcat tool). At least you can try. In this article I'm using openSUSE Linux distro and openCL framework drivers for my NVIDIA GeForce GTX 1060 Mobile graphic card.

Here's an example, how to crack SHA256-hashed password in several minutes using haschat tool.

Let's take a hash of a password, stored in pass.hash file:

$ cat pass.hash

SHA256 password hash

Read more

Written by Administrator on Wednesday May 6, 2020

How to brute-force .hccapx file using hashcat (Brute-force attack) in openSUSE Linux [with screenshots]

Once you have captured WPA handshake and you've got .cap file, you have to convert given .cap file to .hccapx file format in order to brute force it. There're a lot of approaches, how to successfully crack wi-fi passwords. You never know, what is the structure of a password a surely you won't have enough equipment to crack a long password. In my case I'm trying to brute-force a password supposing it's only 8 digits long, because I know exactly, that the owner of a modem is using a model, which has by default only 8-digits password.

Yes, there's a possibility, that he configured his wi-fi modem manually and changed a password for more secure one, but there's also a chance he's just using it "as is". My computer will crack 8-digits long password in several minutes and I'm going to try to do it. In case I'm not successful, I will think about using dictionaries, because cracking even 8 character long password (digits, letters, capitals, special symbols) will take me years to crack.

Read more

Written by Administrator on Tuesday May 5, 2020

How to convert .cap into .hccapx using cap2hccapx in openSUSE Linux

First of all you have to install cap2hccapx application on you computer. cap2hccapx is one of the utilities of hashcat-utils tools. Once you got it and you've grabbed .cap file, you just run a following command:

$ sudo ./cap2hccapx.bin /home/dima/hs/HUAWEIE5372F9EE_E2-19-1D-82-F9-EF.cap /home/dima/hs/HUAWEI_5372.hccapx

All you need is cap2hccapx app and .cap file.

Resut of running above mentioned command:

convert .cap to .hccapx in openSUSE Linux

Read more

Written by Administrator on Tuesday May 5, 2020