Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: ATTENTION! OpenCL kernel self-test failed.
Post: RE: ATTENTION! OpenCL kernel self-test failed.

@ philsmd latest tests of 22000 - WPA-PBKDF2-PMKID+EAPOL are very impressive. 2200x offers many advantages.
ZerBea hashcat 31 12,818 12-22-2019, 12:44 PM
    Thread: CUDA Installation not detected
Post: RE: CUDA Installation not detected

I can confirm this issue also on Linux, running latest driver 430.40 in combination with a MSI 1050 TI AERO: 5.2.7-arch1-1-ARCH cuda 10.1.168 nvidia 430.40-2 nvidia-settings 430.40-3 nvidia-utils...
ZerBea Beta Tester 7 12,889 08-10-2019, 01:51 PM
    Thread: Epic cracking!
Post: RE: Epic cracking!

Helped me to get a high hitrate: https://en.wikipedia.org/wiki/Intelligence_cycle Cheers
ZerBea hashcat 17 13,901 08-04-2017, 08:32 AM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

Upload the cap here: https://wpa-sec.stanev.org/?nets
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,098 05-18-2018, 05:56 PM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

...or simple use hcxtools for capturing and conversion, as they provide nonce-error-corrections and more... BTW: hcxtools running in background of wpa-sec and they did the conversion!
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,098 05-19-2018, 09:15 AM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

Hi kexec. That is a typical aircrack capture. You captured 125954 packets (3.949.735 Bytes) for only one unauthorized handshake (tons of useless frames inside). $ hcxpcaptool -o test.hccapx -E wordl...
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,098 05-22-2018, 09:45 AM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

Hi kexec. I see that you successfully converted it to hccapx using hcxpcaptool, so it is a bug in hashcat's cap2hccapx? hcxpcaptool is completely different to other tools, so it will convert your...
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,098 05-23-2018, 08:14 PM
    Thread: No handshakes when trying to convert to hccapx
Post: RE: No handshakes when trying to convert to hccapx

So the problem is that if cap contains a lot of garbage packets, cap2hccapx cant convert it? How to determine which packets are not needed and I can delete them from .cap file? You can do a cleaning ...
ZerBea hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 10 14,098 05-23-2018, 10:27 PM
    Thread: convert a WPA / WPA2 pcap
Post: RE: convert a WPA / WPA2 pcap

the file name looks like you use a stupid script to capture and prepare wifi traffic! please read this: https://hashcat.net/forum/thread-6666-post-35540.html#pid35540
ZerBea General Talk 9 15,385 10-11-2017, 07:41 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

Also a good idea is to read the RFC docs , even if they are not easy to understand. They are our basic docs if we add new functions to our tools: https://tools.ietf.org/html/rfcXXXX where XXXX is t...
ZerBea hashcat 21 17,277 02-13-2018, 03:49 PM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

I do not want capture this thread, but I have a question: Do you have some informations about (free)RADIUS, specifically about the packet structure of the Attribute Value Pairs in the Access-Request ...
ZerBea hashcat 21 17,277 02-11-2018, 02:05 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

We are talking about different things. You can crack a RADIUS password with hashmode -m 4800 (CHAP). But that's only one single variant. For example: sometimes the password is stored as BASE64(SHA1(...
ZerBea hashcat 21 17,277 02-12-2018, 09:34 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

here: https://github.com/ZerBea/hcxkeys
ZerBea General Talk 20 19,682 03-02-2018, 06:33 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

Maybe you're doing something wrong: $ time wlangenpmkocl -e networkname -i rockyou -A pmklist using: GeForce GTX 1080 Ti 9612471 plainmasterkeys generated, 4734589 password(s) skipped real 0m4...
ZerBea General Talk 20 19,682 03-03-2018, 07:07 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

Well, that's easy to explain: Both modes 2501 and 12000 designed are for analysts who work on large hashfiles. ‎ You captured a network with the same ESSID. Time for calculation of the PMK list ...
ZerBea General Talk 20 19,682 03-05-2018, 10:46 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

No problem, you're welcome. If you are an analyst (coding-, crypto-, weak point analysis), or a penetration tester, or if you use a huge database (wpa-sec) 2501 /12000 is your mode. If not, there is...
ZerBea General Talk 20 19,682 03-05-2018, 11:26 AM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

The simplest way: hashcat -m 2501 test.hccapx pmklist But it doesn't make sense for you, if you are not an analyst!
ZerBea General Talk 20 19,682 03-17-2018, 04:00 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

wlangenpmkocl is the choice to precalculate PMKs for hashcat: $ wlangenpmkocl -h wlangenpmkocl 4.0.1 (C) 2018 ZeroBeat usage: wlangenpmkocl options: -e : input single essid (networkname:...
ZerBea General Talk 20 19,682 03-02-2018, 02:23 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

wlangenpmkocl use only one GPU each task. If you have 2 GPUs, you can calculate 2 different(!) PMK lists at the same time (or two parts of the same list - you need to split your word list into 2 parts...
ZerBea General Talk 20 19,682 03-04-2018, 07:30 PM
    Thread: WPA/WPA2 PMK mode (2501)
Post: RE: WPA/WPA2 PMK mode (2501)

And Again: If you think, 2501 is slow, you're doing something really, really wrong: Session..........: hashcat Status...........: Running Hash.Type........: WPA/WPA2 PMK Hash.Target......: archi...
ZerBea General Talk 20 19,682 03-05-2018, 11:02 AM