Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [asc] Replies Views Posted
    Thread: random gen
Post: RE: random gen

Gosh, Too many people have the same problems as mine, but I only solve them. Just joking. : P I discussed this here: https://hashcat.net/forum/thread-1107.html Post:#10 is the "light". LOL ...
M@LIK Very old oclHashcat-plus Support 5 9,823 05-11-2012, 09:25 PM
    Thread: random gen
Post: RE: random gen

@restrictedbytes (/forum/user-1158.html):: Yes, you are right, he made a mistake with the mask. But, what was more important is he wanted to generate random strings, and the mask thing was just an at...
M@LIK Very old oclHashcat-plus Support 5 9,823 05-11-2012, 11:56 PM
    Thread: hash file limit?
Post: RE: hash file limit?

From Home page (https://hashcat.net/oclhashcat-plus/): Code: -- Multi-Hash (up to 24 million hashes) -- I tried loading 15M, It did work. And I also highly doubt they're all MD5s.
M@LIK Very old oclHashcat-plus Support 2 5,881 05-12-2012, 09:49 AM
    Thread: Large IPB list issue
Post: RE: Large IPB list issue

I think now I know what I was doing wrong: Code: -- Status.......: Running Input.Mode...: ______ Hash.Target..: ______ Hash.Type....: IPB2+, MyBB1.2+ Time.Running.: 7 mins, 6 secs Time.Left.....
M@LIK Very old oclHashcat-plus Support 15 38,225 05-13-2012, 09:33 PM
    Thread: oclHashcat-plus --show question
Post: RE: Bruteforce LM

@Mem5 (https://hashcat.net/forum/user-513.html):: Hashcat deals with LM hashes as chunks (16-bit hashes): 1- --remove doesn't work with LMs. 2- I just noticed this, --show doesn't work too! whatever ...
M@LIK Very old oclHashcat-plus Support 4 8,597 05-15-2012, 01:53 PM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Are you sure? Cause I generated the hash for "omgwtf" and here's what I found: Code: -- 7f8f65c062e3a9536fad48fead0af65a:S$~./ -- 7f8f65c062e3a9536fad48fead0af65a: S$~./:omgwtf 2811 = IPB2+, MyB...
M@LIK Very old oclHashcat-plus Support 13 30,291 05-16-2012, 12:27 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Then, I'm sorry I don't know what's wrong there.
M@LIK Very old oclHashcat-plus Support 13 30,291 05-16-2012, 01:06 AM
    Thread: oclHashcat-plus --show question
Post: RE: oclHashcat-plus --show question

@atom (https://hashcat.net/forum/user-1.html):: Yes! you are right, it's working for me. I didn't know you have to set "-m" when using "--show". And yeah, bytes not bits -__- Too much ****.
M@LIK Very old oclHashcat-plus Support 4 8,597 05-16-2012, 12:22 PM
    Thread: Problems with prefix rule.
Post: RE: Problems with prefix rule.

Simply the rules apply from left to right: ^1^2^3 Code: -- ^1 ^2 ^3 ^1 === 1test >>> ^2 === 21test >>> ^3 === 321test -- BUT: ^3^2^1 Code: -- ^3 ^2 ^1 ^3 === 3tes...
M@LIK Very old oclHashcat-plus Support 4 8,778 05-17-2012, 01:06 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Ahh, yes... you gave two different salts -__- Anyway, the hashes you provide are correct cracks: Code: -- d59be66565eeb562bb2b724d71b8a4e3:S$~!!:omgwtf f179e7768678b3c5daa920bbfc75cffd:Fu~!!:474...
M@LIK Very old oclHashcat-plus Support 13 30,291 05-16-2012, 12:55 AM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

The hash and the password are not matching here, anyone else?
M@LIK Very old oclHashcat-plus Support 11 23,632 05-23-2012, 08:37 PM
    Thread: BruteForce Mode in SMF Hashes
Post: RE: BruteForce Mode in SMF Hashes

It does. Use one mask at the end: Code: -- oclHashcat-plus32.exe -m 121 -n 160 -a 3 --remove -o crackedSMF.txt Forum.txt ?l?l?l?l?l --
M@LIK Very old oclHashcat-plus Support 4 9,329 05-24-2012, 02:08 PM
    Thread: OpenCL Code for Oclhashcat-plus Kernel
Post: RE: OpenCL Code for Oclhashcat-plus Kernel

@undeath (https://hashcat.net/forum/user-85.html):: Nice catch pal xD @NeonFlash (https://hashcat.net/forum/user-1148.html):: Delete the first post (By editing) and the whole thread will be deleted.
M@LIK Very old oclHashcat-plus Support 3 7,746 05-25-2012, 12:21 AM
    Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence

I've already thought about this. The only solution I found is to generate words using maskprocess and piping them to sed, which will do the filtering thing. Code: -- mp64 ?u?u?u?u?u?u?u?u | sed '...
M@LIK Very old oclHashcat-plus Support 125 250,821 05-23-2012, 01:21 AM
    Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence

Hash-IT Wrote: -- Just a quick note, as I am testing WPA I am guessing I probably won't notice much of a speed reduction as WPA is such a slow algorithm anyway ? -- It's not about the algorithm, It's...
M@LIK Very old oclHashcat-plus Support 125 250,821 05-23-2012, 02:47 PM
    Thread: Limiting the consecutive occurrence
Post: RE: Limiting the consecutive occurrence

Hey, I've been thinking about this lately, and good news is that I've more than one possible-valid solution in my mind. Problem is I need more time for this, and that I don't have : ( I have final ex...
M@LIK Very old oclHashcat-plus Support 125 250,821 05-25-2012, 09:36 PM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Verified. Both hashcat and oclHashcat-plus cracked the pass as: Code: -- 507620db658a3d55c367cc8273e2ee24:ьфдщн -- Note: The dictionary file has to be UTF-8 Unicode (withOUT BOM)...
M@LIK Very old oclHashcat-plus Support 11 23,632 05-25-2012, 09:47 PM
    Thread: Bruteforcing WPA
Post: RE: Bruteforcing WPA

You should read the wiki (https://hashcat.net/wiki/) more often. You don't need any character's set, all you need is a Mask attack (https://hashcat.net/wiki/mask_attack). Code: -- meow -m2500 -a3 [...
M@LIK Very old oclHashcat-plus Support 2 5,858 05-26-2012, 02:23 AM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

Code: -- hc64p ..\M\MD5.hash ..\M\Odic.dic -o..\M\OUT.out cudaHashcat-plus v5.36 by atom starting... Hashes: 1 Unique digests: 1 Bitmaps: 8 bits, 256 entries, 0x000000ff mask, 1024 bytes Rul...
M@LIK Very old oclHashcat-plus Support 11 23,632 05-26-2012, 05:42 AM
    Thread: Bruteforcing wpa2
Post: RE: Bruteforcing wpa2

*hard_facepalm*
M@LIK Very old oclHashcat-plus Support 6 11,457 05-26-2012, 06:13 AM