Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: Hashcat Dictionairy Cache Hit
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello! I would greatly appreciate your help as I am sure you are much more knowledgeable about this than me. Hashcat has not been working for me for a while as I constantly receive a "dictionary cache hit" message as soon as hashcat starts running. I am not able to crack even the simple md5sum for "password". When running the command as shown below, rockyou.txt exhausts after 20 seconds of running which is ridiculously fast for my specs.


hashcat -m 0 hash /usr/share/wordlists/rockyou.txt

Host memory required for this attack: 64 MB

Dictionary cache hit:
* Filename..: /usr/share/wordlists/rockyou.txt
* Passwords.: 14344385
* Bytes.....: 139921507
* Keyspace..: 14344385

[s]tatus [p]ause [b]ypass [c]heckpoint [q]uit =>

Session..........: hashcat                     
Status...........: Exhausted
Hash.Name........: MD5
Hash.Target......: 286755fad04869ca523320acce0dc6a4
Time.Started.....: Mon Jul 27 21:07:33 2020 (17 secs)
Time.Estimated...: Mon Jul 27 21:07:50 2020 (0 secs)
Guess.Base.......: File (/usr/share/wordlists/rockyou.txt)
Guess.Queue......: 1/1 (100.00%)
Speed.#1.........:  809.3 kH/s (1.00ms) @ Accel:1024 Loops:1 Thr:1 Vec:8
Recovered........: 0/1 (0.00%) Digests
Progress.........: 14344385/14344385 (100.00%)
Rejected.........: 3094/14344385 (0.02%)
Restore.Point....: 14344385/14344385 (100.00%)
Restore.Sub.#1...: Salt:0 Amplifier:0-1 Iteration:0-1
Candidates.#1....: $HEX[21217265626f756e642121] -> $HEX[042a0337c2a156616d6f732103]

Started: Mon Jul 27 21:06:02 2020
Stopped: Mon Jul 27 21:07:51 2020


I'd sincerely appreciate any insight into this. Thank you so much!
You're cracking "password\n", not "password":

Code:
$ echo -n 'password' | md5sum
5f4dcc3b5aa765d61d8327deb882cf99  -
$ echo 'password' | md5sum
286755fad04869ca523320acce0dc6a4  -

Most passwords are stored without trailing linefeeds. It looks like you may have generated the hash yourself on the command line?

Welcome the club. We all did it at some point. Smile
Oh man this is embarrassing. I really appreciate your help as I have been scratching my head on this for a while! All the best!