Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: How to see when over the 15 char limit?
Post: RE: How to see when over the 15 char limit?

Code: -- Rejected.....: 59269488/133906311 (44.26%) --
M@LIK Very old oclHashcat-plus Support 8 15,420 09-30-2012, 09:39 PM
    Thread: How to see when over the 15 char limit?
Post: RE: How to see when over the 15 char limit?

It does relate to algorithm somehow. For example, when using -m2500 (WPA) it will reject passes < 8 chars due to WPA's limitation. The "BOOM!" here is that plus-0.09 apparently has a bug with reje...
M@LIK Very old oclHashcat-plus Support 8 15,420 09-30-2012, 10:06 PM
    Thread: How to see when over the 15 char limit?
Post: RE: How to see when over the 15 char limit?

Kgx Pnqvhm Wrote: -- And when I run a bunch of dictionaries via a command file (Windows), I don't even see the status screens, until the last one. The "Scanning dictionary" section didn't complain...
M@LIK Very old oclHashcat-plus Support 8 15,420 09-30-2012, 10:16 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Simple. 1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat: Code: -- sed "s#^\(.\{9\}\)\(.\{40\}\...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 09:58 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

SnakeEye Wrote: -- I actually tried removing first 9 chars and using a online decrypter which did not work :-) -- Negative. Salted hashes can not be cracked using online DBs. SnakeEye Wrote: -- C...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 10:31 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Yes, just stack them in your command line: Code: -- ... dict1.txt dict2.txt dict3.txt -- Easy as that.
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 11:40 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Good! And yes, that's one way to use the sed command. I just wrote you the command you can utilize it in many ways. Just to make sure everything is going in the right way, try cracking a known h...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-16-2012, 12:10 AM
    Thread: Bruteforce/Mask captial and non capital letters?
Post: RE: Bruteforce/Mask captial and non capital letter...

Move the mask after the hashfile.
M@LIK General Help 8 20,903 10-23-2012, 12:05 PM
    Thread: Bruteforce/Mask captial and non capital letters?
Post: RE: Bruteforce/Mask captial and non capital letter...

Post your command-line here.
M@LIK General Help 8 20,903 10-23-2012, 04:46 PM
    Thread: Rejector modifier
Post: RE: Rejector modifier

What?!
M@LIK Feature Requests 8 16,645 11-20-2012, 09:47 PM
    Thread: oclHashcat-gui problem
Post: RE: oclHashcat-gui problem

Smart enough to take a screen shot and draw some retarded arrows and numbers but not to type a bloody YES. ... Dexter is only good at killing.
M@LIK Very old oclHashcat-plus Support 8 13,590 12-19-2012, 02:55 PM
    Thread: Hashcat Bruteforce attack
Post: RE: Hashcat Bruteforce attack

The following thread will help you: https://hashcat.net/forum/thread-1836.html
M@LIK Very old oclHashcat-plus Support 8 48,691 12-30-2012, 02:37 PM
    Thread: understanding "Time.Estimated" in oclHashcat-plus "status" output
Post: RE: understanding "Time.Estimated" in oclHashcat-p...

My guess, it's calculated in real-time and it's a result of simple math depending on two factors. Current speed, left keyspace.
M@LIK Very old oclHashcat-plus Support 8 15,077 01-13-2013, 08:07 AM
    Thread: understanding "Time.Estimated" in oclHashcat-plus "status" output
Post: RE: understanding "Time.Estimated" in oclHashcat-p...

This is a bug which has been reported more than once, they're working on it. (hopefully)
M@LIK Very old oclHashcat-plus Support 8 15,077 01-13-2013, 11:28 AM
    Thread: Custom brute force possiable?
Post: RE: Custom brute force possiable?

2Fac3 Wrote: -- Sweet! Hash cat is fast, reliable, and very customizable. In other words its AWESOME! -- True story.
M@LIK Very old oclHashcat-plus Support 8 15,855 03-07-2013, 12:52 PM
    Thread: Yet another hash identification problem
Post: RE: Yet another hash identification problem

rurapenthe Wrote: (03-31-2012, 06:40 PM) -- Its sha1 or ripemd160. My hashcat is happy to use a sa SHA1 hash but its not cracking to "hello". -- HashCat is happy to crack any 40 characters.. but i...
M@LIK General Help 7 16,804 03-31-2012, 07:08 PM
    Thread: Yet another hash identification problem
Post: RE: Yet another hash identification problem

undeath Wrote: (03-31-2012, 10:14 PM) -- you, my dear friend, have no clue what you are talking about. -- xD i just ignored him because of this.. rurapenthe: sorry amigo.. but its true
M@LIK General Help 7 16,804 03-31-2012, 10:21 PM
    Thread: BruteForce with custom chart set
Post: RE: BruteForce with custom chart set

when u set a character set.. u use ?1 instead of ?d, ?u or ?l.. so u command is:: Code: -- oclHashcat-plus64 -m2500 --gpu-watchdog80 -a3 -1 WEDSZJMH -owpa_cracked.hccap.out --outfile-format2 wpa_ha...
M@LIK Very old oclHashcat-plus Support 7 15,033 04-08-2012, 11:27 PM
    Thread: BruteForce with custom chart set
Post: RE: BruteForce with custom chart set

i dont think so.. but why u doing this?? it will waste ur time.. just do a regular bf with all uppercase letters.. it will take a decent while depending on GpU..
M@LIK Very old oclHashcat-plus Support 7 15,033 04-09-2012, 12:17 AM
    Thread: sl3 problem with oclhashcat-lite-0.9
Post: RE: sl3 problem with oclhashcat-lite-0.9

I'm not the SL3 expert here, but I think you should provide more information about your error. (Screenshot?)
M@LIK Very old oclHashcat-lite Support 7 15,482 05-05-2012, 12:43 AM