Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

An ethpresale tool on github says this: https://github.com/kholia/ethpresale/blob/master/pyethtool/pyethtool.py Quote: -- if not seed: seed = random_key().decode('hex') # uses pybitcointools'...
uprising_bike hashcat 10 6,384 06-30-2018, 02:15 AM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

philsmd Wrote: (06-29-2018, 05:46 PM) -- hashcat uses ?H for 0123456789ABCDEF ... the main problem now is that the hash mode -m 5000 only supports a password length of 55 bytes. ... -- This must be ...
uprising_bike hashcat 10 6,384 06-29-2018, 06:08 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

phil: Sorry.  I was being silly.  I meant hex characters between 0 and F not full bytes, so (2^4)^5 =1048576.  These could be at any one of C(64, 5) = 7624512, so a space of approximately 8*10^12. ...
uprising_bike hashcat 10 6,384 06-29-2018, 05:35 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: Cracking partial hex seed for Ethreum Presale

Hello and thank you to any prospective helpers.  Apologies if this is obvious, but I may have missed something in the mask documentation or have been looking in the wrong place. I have been unable...
uprising_bike hashcat 10 6,384 06-29-2018, 04:23 PM