Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [asc] Replies Views Posted
    Thread: Cisco ASA
Post: RE: Cisco ASA

Pipe maskprocessor (https://hashcat.net/wiki/doku.php?id=maskprocessor) to -plus, and you can use rules. Code: -- mp64 -i ?d?d?d?d | -plus -m2400 -r usernames.rule hashfile -- This above will brute-...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 06:21 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Yes, I will be lying if I said I didn't think about that. Indeed, maskprocessor's performance is nowhere around GPU's performance. You can also make a file with all chopped usernames, analyze them...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-18-2012, 09:06 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Then -a7 is the way to go! It requires a mask on the left side and a dict on the right side, means, the brute-force mask on the left side and the chopped usernames on the right side. See below: C...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-19-2012, 05:49 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

Btw, I wrote this perl script to make the charactersets out of the usernames list, you don't need to chop them or anything, just do: Code: -- perl CiscoASA.pl < usernames -- CiscoASA.pl: Code: -...
M@LIK Very old oclHashcat-plus Support 15 45,270 10-19-2012, 06:07 PM
    Thread: o c/s using oclhashcat plus 0.09
Post: RE: o c/s using oclhashcat plus 0.09

Yes, it's missing a dict.
M@LIK Very old oclHashcat-plus Support 4 9,624 10-22-2012, 12:08 AM
    Thread: Output with --show help.
Post: RE: Output with --show help.

oclHashcat-plus's --show is too simple to do that. Apparently, you're on Windows. So grab gawk (Google it) and run the following kinda-ugly one-liner: Code: -- gawk -F: "FNR==NR{a[$2]=$1;next} $1...
M@LIK Very old oclHashcat-plus Support 2 10,422 10-28-2012, 12:14 AM
    Thread: After format speed goes down 50% on HD 7970
Post: RE: After format speed goes down 50% on HD 7970

I don't think so. Your file doesn't seem to exists. Hold shift on your keyboard, right-click on the hashfile, select "Copy as path" and paste in your command line.
M@LIK Very old oclHashcat-plus Support 13 19,455 10-28-2012, 12:10 PM
    Thread: wordpress hash
Post: RE: wordpress hash

Replace "hash.txt" with the full path to the file. E.g.: "D:\mygayasianporno\hash.txt"
M@LIK Very old oclHashcat-plus Support 3 13,377 11-11-2012, 08:29 PM
    Thread: wordpress hash
Post: RE: wordpress hash

Yes, these hashes are normally slow.
M@LIK Very old oclHashcat-plus Support 3 13,377 11-11-2012, 08:37 PM
    Thread: sha256(pass.salt)
Post: RE: sha256(pass.salt)

Your command-line? FYI, the thread is closed.
M@LIK Very old oclHashcat-plus Support 4 11,797 11-17-2012, 06:11 PM
    Thread: sha256(pass.salt)
Post: RE: sha256(pass.salt)

Try something simple, like: Code: -- cudaHashcat-plus64 -m1410 -a3 A231FDDFB80C2EAC1EB4C38A36B9628F73A418988FCABD119C2E9C6E5F0E01E8::20120902:12 delicious90 --
M@LIK Very old oclHashcat-plus Support 4 11,797 11-17-2012, 06:20 PM
  Bug Thread: Bad --hex-charset
Post: Bad --hex-charset

--hex-charset affects interpreting the whole command-line instead of working on charsets only. See below: Code: -- // md5-fu 3631313171ffbf23b394fa8ecd9e83e5:zer0 // hashcat-fu -plus -a3 --f...
M@LIK Very old oclHashcat-plus Support 1 5,810 11-30-2012, 01:27 PM
    Thread: time estimate for brute forcing wpa2
Post: RE: time estimate for brute forcing wpa2

91403960 years only.
M@LIK Very old oclHashcat-plus Support 5 12,300 12-12-2012, 09:06 PM
    Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied

To fully utilize GPU, use separate lines. Or at least, pipe the a-z part only and use rules on -plus's side. Code: -- mp64 --increment-min=6 ?l?l?l?l?l?l?l?l | -plus -r ./hybrid/append_d.rule -r ...
M@LIK Very old oclHashcat-plus Support 11 22,058 12-14-2012, 11:15 PM
    Thread: oclHashcat-gui problem
Post: RE: oclHashcat-gui problem

Smart enough to take a screen shot and draw some retarded arrows and numbers but not to type a bloody YES. ... Dexter is only good at killing.
M@LIK Very old oclHashcat-plus Support 8 13,590 12-19-2012, 02:55 PM
    Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied

-plus reads s or p from STDIN (user's input), and since STDIN is busy with mp64 there's no way to read user's input, so the status show every 10 secs automatically. Again, the neatest, best way to ...
M@LIK Very old oclHashcat-plus Support 11 22,058 12-20-2012, 10:42 PM
    Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied

Code: -- -plus hccap ?l?d?d -plus hccap ?l?l?d?d -plus hccap ?l?l?l?d?d -plus hccap ?l?l?l?l?d?d -plus hccap ?l?l?l?l?l?d?d ... -- Run one at a time. Another option is to make a loop: Code:...
M@LIK Very old oclHashcat-plus Support 11 22,058 12-20-2012, 11:16 PM
    Thread: maskprocessor increment with 2 digits applied
Post: RE: maskprocessor increment with 2 digits applied

I don't about WPA, but for simple hashing algorithms, see: https://www.md5decrypter.co.uk/hash-a-password.aspx
M@LIK Very old oclHashcat-plus Support 11 22,058 12-20-2012, 11:42 PM
    Thread: Hashcat Bruteforce attack
Post: RE: Hashcat Bruteforce attack

The following thread will help you: https://hashcat.net/forum/thread-1836.html
M@LIK Very old oclHashcat-plus Support 8 48,691 12-30-2012, 02:37 PM
    Thread: Bugs at new version
Post: RE: Bugs at new version

Yes, seen before. As far as I can tell, this happens because of the dict caching thing. Try removing hashcat.dictstat and try again. Btw, it's no big deal the attack will exhaust when its finished.
M@LIK Very old oclHashcat-plus Support 4 8,506 01-03-2013, 12:32 AM