Search Results
|
Post |
Author |
Forum |
Replies
[asc]
|
Views |
Posted |
|
|
Thread: Truecrypt
Post: RE: Truecrypt
definitely supporting this..
+1 vote |
|
M@LIK |
Feature Requests
|
9 |
27,826 |
04-11-2012, 09:07 AM |
|
|
Thread: SHA-256($salt.$pass)
Post: RE: SHA-256($salt.$pass)
|
M@LIK |
Feature Requests
|
9 |
26,015 |
05-06-2012, 06:41 PM |
|
|
Thread: MD5 Crack with Salt
Post: RE: MD5 Crack with Salt
|
M@LIK |
Old hashcat Support
|
9 |
59,390 |
05-07-2012, 05:11 PM |
|
|
Thread: Help with md5($salt.$pass.$salt)
Post: RE: Help with md5($salt.$pass.$salt)
Hey, I found your password... no kidding.
I did it for experience not your blue eyes. |
|
M@LIK |
Feature Requests
|
9 |
21,096 |
05-16-2012, 09:01 PM |
|
|
Thread: Help with md5($salt.$pass.$salt)
Post: RE: Help with md5($salt.$pass.$salt)
@Vanilla Godzilla (https://hashcat.net/forum/user-1791.html):: Your hash is not the usual md5($salt.$pass.$salt), because of the two different salts.
To get your password and to clean up this mess, ... |
|
M@LIK |
Feature Requests
|
9 |
21,096 |
05-16-2012, 11:18 PM |
|
|
Thread: oclhc-plus: Incremental-bruteforce in hybrid attack
Post: oclhc-plus: Incremental-bruteforce in hybrid attac...
Hello, I want to request the support of incremental-bruteforce while using the hybrid attack (https://hashcat.net/wiki/hybrid_attack).
Instead of:
Code:
--
-a6 %dict% ?d?d
-a6 %dict% ?d?d?d
-a6 ... |
|
M@LIK |
Feature Requests
|
9 |
20,670 |
06-10-2012, 04:13 PM |
|
|
Thread: oclhc-plus: Incremental-bruteforce in hybrid attack
Post: RE: oclhc-plus: Incremental-bruteforce in hybrid a...
@proinside (https://hashcat.net/forum/user-39.html):: It does, but I'm trying to save some time + to have one final result of cracked hashes, time, speed and all. |
|
M@LIK |
Feature Requests
|
9 |
20,670 |
06-15-2012, 07:40 PM |
|
|
Thread: oclhc-plus: Incremental-bruteforce in hybrid attack
Post: RE: oclhc-plus: Incremental-bruteforce in hybrid a...
@blazer (https://hashcat.net/forum/user-60.html):: That's not really a smart idea. And again:
M@LIK Wrote:
--
...I'm trying to save some time + to have one final result of cracked hashes, time, speed... |
|
M@LIK |
Feature Requests
|
9 |
20,670 |
06-15-2012, 09:04 PM |
|
|
Thread: Hashcat-gui does nothing
Post: RE: Hashcat-gui does nothing
MD5Decrypter.co.uk Forum (https://forum.md5decrypter.co.uk)
InsidePro Forum (https://forum.insidepro.com) |
|
M@LIK |
Old hashcat Support
|
9 |
22,607 |
06-24-2012, 02:55 PM |
|
|
Thread: oclhashcat-lite-0.11 error: ./kernels/4098/markov_le.llvmir: no such file...
Post: RE: oclhashcat-lite-0.11 error: ./kernels/4098/mar...
Is this oclHashcat-lite-0.11b2? It works fine here.
Maybe some kernels are not updated yet on AMD. |
|
M@LIK |
Beta Tester
|
9 |
8,123 |
07-08-2012, 07:44 PM |
|
|
Thread: oclhashcat-lite-0.11 error: ./kernels/4098/markov_le.llvmir: no such file...
Post: RE: oclhashcat-lite-0.11 error: ./kernels/4098/mar...
Try oclHashcat-lite-0.10 with 12.7b drivers. |
|
M@LIK |
Beta Tester
|
9 |
8,123 |
07-08-2012, 11:07 PM |
|
|
Thread: oclhashcat-lite-0.11 error: ./kernels/4098/markov_le.llvmir: no such file...
Post: RE: oclhashcat-lite-0.11 error: ./kernels/4098/mar...
Okay, I also think that there's a problem with the new oclHashcat-lite-0.11.
Even the change log is bit weird:
Code:
--
* changes v0.10 -> v0.11:
* changes v0.09 -> v0.10:
...
--
|
|
M@LIK |
Beta Tester
|
9 |
8,123 |
07-08-2012, 11:21 PM |
|
|
Thread: oclhashcat-lite-0.11 error: ./kernels/4098/markov_le.llvmir: no such file...
Post: RE: oclhashcat-lite-0.11 error: ./kernels/4098/mar...
Yes, I believe it is.
Obviously, markov_le.llvmir is a file not a directory.
You might want to try coping it from oclHashcat-lite-0.10 final.
Or just stick with oclHashcat-lite-0.10 and wait! |
|
M@LIK |
Beta Tester
|
9 |
8,123 |
07-08-2012, 11:39 PM |
|
|
Thread: Morph - Hashcat_utils
Post: RE: Morph - Hashcat_utils
I wish I can answer this. |
|
M@LIK |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
9 |
19,982 |
08-15-2012, 11:29 PM |
|
|
Thread: V56 is up
Post: RE: V56 is up
Since after plus-0.09b45 up to plus-0.09b57, when I try:
Code:
--
hc64p -a3 --bf-min=8 --markov-disable --force 00000000000000000000000000000000 ?a?a?a?a?a?a?a?a
--
I get:
Code:
--
[s]tatus [p]aus... |
|
M@LIK |
Beta Tester
|
9 |
7,924 |
08-30-2012, 01:56 PM |
|
|
Thread: V56 is up
Post: RE: V56 is up
Just tried -m2(6|7)11 on all lengths, all attack-modes. Result: All Works!
Also "cuMemcpyDtoD() 1" is gone! Thanks atom (https://hashcat.net/forum/user-1.html)!
System:
Windows7 64-bit, nVidia, 304,... |
|
M@LIK |
Beta Tester
|
9 |
7,924 |
08-30-2012, 05:06 PM |
|
|
Thread: V56 is up
Post: RE: V56 is up
Finally, all tests are done!
Results: (If no note is given means all is working perfectly!)
Code:
--
-m0
-m10
-m20
-m30
-m40
-m100
-m110
-m120
-m130: Same problem as -m131, -m132.
-m140
-... |
|
M@LIK |
Beta Tester
|
9 |
7,924 |
08-31-2012, 05:16 AM |
|
|
Thread: HashCat Output [Question] [Help]
Post: RE: HashCat Output [Question] [Help]
Because it's not for noobs. |
|
M@LIK |
Old hashcat Support
|
9 |
16,041 |
09-29-2012, 12:46 PM |
|
|
Thread: Passwords^12 - program & registration
Post: RE: Passwords^12 - program & registration
That's great news for me as well. Thanks! |
|
M@LIK |
Organisation and Events
|
9 |
20,084 |
10-16-2012, 12:14 AM |
|
|
Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?
You're out of luck and you can not use hashcat to crack WPA if you don't have an AMD/Nvidia GPU.
But it's somewhat possible in oclHashcat-plus.
Your English is more than fine, self-underestimation... |
|
M@LIK |
Very old oclHashcat-plus Support
|
9 |
23,917 |
01-10-2013, 04:10 PM |