Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: How to see when over the 15 char limit?
Post: RE: How to see when over the 15 char limit?

Kgx Pnqvhm Wrote: -- And when I run a bunch of dictionaries via a command file (Windows), I don't even see the status screens, until the last one. The "Scanning dictionary" section didn't complain...
M@LIK Very old oclHashcat-plus Support 8 15,416 09-30-2012, 10:16 PM
    Thread: sha512crypt hash error
Post: RE: sha512crypt hash error

Put the whole hash, starting with $6$ to if/.
M@LIK Very old oclHashcat-plus Support 10 24,507 10-01-2012, 05:31 PM
    Thread: permission denied in hybrid mode
Post: RE: permission denied in hybrid mode

@Mem5 (https://hashcat.net/forum/user-513.html):: -a6|7 must work with real dict file. Stdin will not work.
M@LIK Very old oclHashcat-plus Support 7 11,331 10-06-2012, 01:59 AM
    Thread: NVIDIA GeForce 7600 GS ..
Post: RE: NVIDIA GeForce 7600 GS ..

The latest WHQL driver is 306.23 not 301.42. Try installing that and see if it helps. https://www.nvidia.com/Download/Find.aspx
M@LIK Very old oclHashcat-plus Support 6 18,127 10-08-2012, 01:57 AM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Simple. 1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat: Code: -- sed "s#^\(.\{9\}\)\(.\{40\}\...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 09:58 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Yes, just stack them in your command line: Code: -- ... dict1.txt dict2.txt dict3.txt -- Easy as that.
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 11:40 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Good! And yes, that's one way to use the sed command. I just wrote you the command you can utilize it in many ways. Just to make sure everything is going in the right way, try cracking a known h...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-16-2012, 12:10 AM
    Thread: Oracle 11g Format
Post: RE: Oracle 11g Format

I guess that's not an Oracle 11g hash. Probably Oracle 7-10g. Try -m3100, the correct format is HASH:USERNAME where hash is the 16 hex characters. Code: -- CE4A36B8E06CA59C:*** --
M@LIK Very old oclHashcat-plus Support 12 27,490 10-17-2012, 03:43 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

As far as I know, Cisco-PIX MD5 hashing doesn't involve any salting.
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 04:36 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

That's what I was exactly writing you, see below. It's not very professional, but you can get away with rules or multi-rules. Make a rule-file with all first four bytes of the usernames, you can...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 05:34 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

SnakeEye Wrote: -- I actually tried removing first 9 chars and using a online decrypter which did not work :-) -- Negative. Salted hashes can not be cracked using online DBs. SnakeEye Wrote: -- C...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 10:31 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules. Code: -- mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile -- This above will brute-...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 06:21 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Yes, I will be lying if I said I didn't think about that. Indeed, maskprocessor's performance is nowhere around GPU's performance. You can also make a file with all chopped usernames, analyze them...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 09:06 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Then -a7 is the way to go! It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below: C...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-19-2012, 05:49 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do: Code: -- perl CiscoASA.pl < usernames -- CiscoASA.pl: Code: -...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-19-2012, 06:07 PM
    Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09

Yes, it's missing a dict.
M@LIK Very old oclHashcat-plus Support 4 9,624 10-22-2012, 12:08 AM
    Thread: Output with --show help.
Post: RE: Output with --show help.

oclHashcat-plus's --show is too simple to do that. Apparently, you're on Windows. So grab gawk (Google it) and run the following kinda-ugly one-liner: Code: -- gawk -F: "FNR==NR{a[$2]=$1;next} $1...
M@LIK Very old oclHashcat-plus Support 2 10,420 10-28-2012, 12:14 AM
    Thread: After format speed goes down 50% on HD 7970
Post: RE: After format speed goes down 50% on HD 7970

I don't think so. Your file doesn't seem to exists. Hold shift on your keyboard, right-click on the hashfile, select "Copy as path" and paste in your command line.
M@LIK Very old oclHashcat-plus Support 13 19,455 10-28-2012, 12:10 PM
    Thread: wordpress hash
Post: RE: wordpress hash

Replace "hash.txt" with the full path to the file. E.g.: "D:\mygayasianporno\hash.txt"
M@LIK Very old oclHashcat-plus Support 3 13,375 11-11-2012, 08:29 PM
    Thread: wordpress hash
Post: RE: wordpress hash

Yes, these hashes are normally slow.
M@LIK Very old oclHashcat-plus Support 3 13,375 11-11-2012, 08:37 PM