Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: oclHashcat-plus --show question
Post: RE: oclHashcat-plus --show question

@atom (https://hashcat.net/forum/user-1.html):: Yes! you are right, it's working for me. I didn't know you have to set "-m" when using "--show". And yeah, bytes not bits -__- Too much ****.
M@LIK Very old oclHashcat-plus Support 4 8,597 05-16-2012, 12:22 PM
    Thread: bug in 0.40b4
Post: RE: bug in 0.40b4

Yup, I noticed something similar in v0.39.
M@LIK Old hashcat Support 3 6,939 05-16-2012, 12:08 PM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Then, I'm sorry I don't know what's wrong there.
M@LIK Very old oclHashcat-plus Support 13 30,288 05-16-2012, 01:06 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Ahh, yes... you gave two different salts -__- Anyway, the hashes you provide are correct cracks: Code: -- d59be66565eeb562bb2b724d71b8a4e3:S$~!!:omgwtf f179e7768678b3c5daa920bbfc75cffd:Fu~!!:474...
M@LIK Very old oclHashcat-plus Support 13 30,288 05-16-2012, 12:55 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Are you sure? Cause I generated the hash for "omgwtf" and here's what I found: Code: -- 7f8f65c062e3a9536fad48fead0af65a:S$~./ -- 7f8f65c062e3a9536fad48fead0af65a: S$~./:omgwtf 2811 = IPB2+, MyB...
M@LIK Very old oclHashcat-plus Support 13 30,288 05-16-2012, 12:27 AM
    Thread: restore file
Post: RE: restore file

What?
M@LIK Feature Requests 2 9,404 05-15-2012, 05:53 PM
    Thread: oclHashcat-plus --show question
Post: RE: Bruteforce LM

@Mem5 (https://hashcat.net/forum/user-513.html):: Hashcat deals with LM hashes as chunks (16-bit hashes): 1- --remove doesn't work with LMs. 2- I just noticed this, --show doesn't work too! whatever ...
M@LIK Very old oclHashcat-plus Support 4 8,597 05-15-2012, 01:53 PM
    Thread: Large IPB list issue
Post: RE: Large IPB list issue

I think now I know what I was doing wrong: Code: -- Status.......: Running Input.Mode...: ______ Hash.Target..: ______ Hash.Type....: IPB2+, MyBB1.2+ Time.Running.: 7 mins, 6 secs Time.Left.....
M@LIK Very old oclHashcat-plus Support 15 38,222 05-13-2012, 09:33 PM
    Thread: Configuration for speed up ocl ?
Post: RE: Configuration for speed up ocl ?

@Mem5 (https://hashcat.net/forum/user-513.html):: I would suggest you to increase "-n" when brute-forcing, decrease when dicting (Dictionary attack) xD. And lower "--gpu-loops" when attacking slow-as-...
M@LIK General Help 7 16,275 05-13-2012, 07:08 PM
    Thread: Bruteforce LM
Post: RE: Bruteforce LM

@phillips321 (https://hashcat.net/forum/user-1734.html):: What you want is called Increment Brute Force (https://hashcat.net/forum/thread-855.html). It's not supported yet, but: Give it your vote! h...
M@LIK General Help 3 10,081 05-13-2012, 06:31 PM
    Thread: hash file limit?
Post: RE: hash file limit?

From Home page (https://hashcat.net/oclhashcat-plus/): Code: -- Multi-Hash (up to 24 million hashes) -- I tried loading 15M, It did work. And I also highly doubt they're all MD5s.
M@LIK Very old oclHashcat-plus Support 2 5,878 05-12-2012, 09:49 AM
    Thread: random gen
Post: RE: random gen

@restrictedbytes (/forum/user-1158.html):: Yes, you are right, he made a mistake with the mask. But, what was more important is he wanted to generate random strings, and the mask thing was just an at...
M@LIK Very old oclHashcat-plus Support 5 9,823 05-11-2012, 11:56 PM
    Thread: random gen
Post: RE: random gen

Gosh, Too many people have the same problems as mine, but I only solve them. Just joking. : P I discussed this here: https://hashcat.net/forum/thread-1107.html Post:#10 is the "light". LOL ...
M@LIK Very old oclHashcat-plus Support 5 9,823 05-11-2012, 09:25 PM
    Thread: New rule
Post: RE: New rule

+1 if it does what I think it does. The new rule is ( a ): Code: -- cat wordlist pass1 123pass p4ss 66killsin1 cat rule a $1 a $s hc wordlist -r rule --stdout pass1 pass1 p4ss kil...
M@LIK Feature Requests 5 10,957 05-09-2012, 07:23 PM
    Thread: oclHashcat-plus v0.09 Poll 1/3: Next major feature
Post: RE: oclHashcat-plus v0.09 Poll 1/3: Next major fea...

I want to see: Code: -- 42f45c9ac679d7a39d7ac97e4f64e38b:This Password has about 70 charcters, Too long? No problem. HASHCAT is here! Status.......: Cracked Hash.Target..: 42f45c9ac679d7a39d7ac9...
M@LIK Organisation and Events 23 55,342 05-09-2012, 04:19 PM
    Thread: oclHashcat-plus v0.09 Poll 3/3: Next algorithms
Post: RE: oclHashcat-plus v0.09 Poll 3/3: Next algorithm...

TrueCrypt!! https://screenshots.en.sftcdn.net/en/scrn/68000/68775/truecrypt-21.jpg
M@LIK Organisation and Events 15 35,522 05-09-2012, 04:01 PM
    Thread: oclHashcat-plus v0.081 *HOTFIX*
Post: RE: oclHashcat-plus v0.081 *HOTFIX*

I don't need this. But thanks for the efforts!
M@LIK Very old oclHashcat-plus Announcements 5 19,044 05-08-2012, 11:47 AM
    Thread: MD5 Crack with Salt
Post: RE: MD5 Crack with Salt

L0L
M@LIK Old hashcat Support 9 59,388 05-07-2012, 05:11 PM
    Thread: SHA-256($salt.$pass)
Post: RE: SHA-256($salt.$pass)

Sounds fun. xD
M@LIK Feature Requests 9 26,014 05-06-2012, 06:41 PM
    Thread: mp64: generate total random words
Post: RE: mp64: generate total random words

Indeed. I think you should (specially if it was faster). I find this useful when crazy bruteforces are needed like (?d?l?u=12, ?d=16, etc) You can generate 5\10GiGs and try them, and get around 2% ...
M@LIK hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 20 42,461 05-06-2012, 04:04 PM