Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: my Geforce Gtx 670 doesn't work with oclHashcat-plus-0.09
Post: RE: my Geforce Gtx 670 doesn't work with oclHashca...

306.23 is WHQL.
M@LIK Very old oclHashcat-lite Support 16 32,346 09-20-2012, 03:50 PM
    Thread: Nead help whit command
Post: RE: Nead help whit command

hmm.. there are couple of ways to do this.. 2 came through my mind.. 1st:: u can make a script/bat file that checks every 60sec ((for example)) for the first output file "E52_355216034221476.txt".....
M@LIK Very old oclHashcat-lite Support 16 31,586 04-02-2012, 02:51 PM
    Thread: Nead help whit command
Post: RE: Nead help whit command

KT819GM is right.. u just make .cmd file:: Code: -- [1st_job] [2nd_job] [3rd_job] ... -- woks fine for me.. : )
M@LIK Very old oclHashcat-lite Support 16 31,586 04-03-2012, 06:20 PM
    Thread: Extracting the passwords from a multiple file wordlist (sed & grep).
Post: RE: Extracting the passwords from a multiple file ...

Optimization? Code: -- type *.* | sed '/pass=/I!d;s/pass=\(.*$\)/\1/I;s/^[ \t]*//;s/[ \t]*$//' | sort | uniq -c | sort -nr | cut -c9- > wordlist_FINAL.txt --
M@LIK General Talk 12 30,913 06-14-2012, 07:35 PM
    Thread: Extracting the passwords from a multiple file wordlist (sed & grep).
Post: RE: Extracting the passwords from a multiple file ...

Agreed. Thanks for the input.
M@LIK General Talk 12 30,913 06-14-2012, 09:34 PM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Are you sure? Cause I generated the hash for "omgwtf" and here's what I found: Code: -- 7f8f65c062e3a9536fad48fead0af65a:S$~./ -- 7f8f65c062e3a9536fad48fead0af65a: S$~./:omgwtf 2811 = IPB2+, MyB...
M@LIK Very old oclHashcat-plus Support 13 30,291 05-16-2012, 12:27 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Ahh, yes... you gave two different salts -__- Anyway, the hashes you provide are correct cracks: Code: -- d59be66565eeb562bb2b724d71b8a4e3:S$~!!:omgwtf f179e7768678b3c5daa920bbfc75cffd:Fu~!!:474...
M@LIK Very old oclHashcat-plus Support 13 30,291 05-16-2012, 12:55 AM
    Thread: IPB2 md5(md5($salt).md5($pass)) issue?
Post: RE: IPB2 md5(md5($salt).md5($pass)) issue?

Then, I'm sorry I don't know what's wrong there.
M@LIK Very old oclHashcat-plus Support 13 30,291 05-16-2012, 01:06 AM
    Thread: howto use stats processor with oclHashcat+ v0.8?
Post: RE: howto use stats processor with oclHashcat+ v0....

Oi... WPA/WPA2 can't have 5 long characters string as a password!! -You don't set --attack-mode when "stdin"ing. -You used sp64 and then sp32, which one is yours? -You used bin and then exe, which one...
M@LIK Very old oclHashcat-plus Support 17 30,281 07-08-2012, 12:42 AM
    Thread: Start From Stop At Brute Force
Post: RE: Start From Stop At Brute Force

Thumbs up for these options in oclHashcat-plus: Code: -- -s, --pw-skip=NUM Start cracking at NUM -f, --pw-skip-plain=STR Like --pw-skip, but start cracking at STR --
M@LIK Very old oclHashcat-plus Support 15 29,325 06-01-2012, 02:09 AM
    Thread: Speed drop after playing game (Crysis3)
Post: RE: Speed drop after playing game (Crysis3)

epixoip Wrote: -- this is the price you pay for free porn. -- I see bright experience.
M@LIK Very old oclHashcat-plus Support 20 29,275 02-26-2013, 09:04 PM
    Thread: Problem with brute-force
Post: RE: Problem with brute-force

Try coping the command line next to Start button and pasting it into the cmd window that popes up. An advice: Try learning command-lines, GUI is definitely not for pros = )
M@LIK Old hashcat Support 14 28,919 07-09-2012, 06:06 PM
    Thread: Problem with brute-force
Post: RE: Problem with brute-force

*sighs* Your card nVidia card doesn't support CUDA === NO oclhashcat-plus|lite for you, sorry !
M@LIK Old hashcat Support 14 28,919 07-09-2012, 08:35 PM
    Thread: Removing Bad Hashes
Post: RE: Removing Bad Hashes

Well, it always differs from one situation to another. There's no one holly command which will help you always xD
M@LIK General Talk 13 28,532 07-08-2012, 07:36 PM
    Thread: Removing Bad Hashes
Post: RE: Removing Bad Hashes

@Hash-IT (https://hashcat.net/forum/user-776.html):: Replaying to your PM too: What you want to do can be easily done using the following RegEx command: Code: -- ^00000[^0] -- This will remove any...
M@LIK General Talk 13 28,532 07-08-2012, 04:53 PM
    Thread: Truecrypt
Post: RE: Truecrypt

definitely supporting this.. +1 vote
M@LIK Feature Requests 9 27,826 04-11-2012, 09:07 AM
    Thread: Oracle 11g Format
Post: RE: Oracle 11g Format

I guess that's not an Oracle 11g hash. Probably Oracle 7-10g. Try -m3100, the correct format is HASH:USERNAME where hash is the 16 hex characters. Code: -- CE4A36B8E06CA59C:*** --
M@LIK Very old oclHashcat-plus Support 12 27,490 10-17-2012, 03:43 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Simple. 1 - You need to reformat your hashes. The first 9 bytes are the salt and the rest is the actual sha1 hash, use the following sed command to reformat: Code: -- sed "s#^\(.\{9\}\)\(.\{40\}\...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 09:58 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

SnakeEye Wrote: -- I actually tried removing first 9 chars and using a online decrypter which did not work :-) -- Negative. Salted hashes can not be cracked using online DBs. SnakeEye Wrote: -- C...
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 10:31 PM
    Thread: Help for cracking SHA1 password:salt
Post: RE: Help for cracking SHA1 password:salt

Yes, just stack them in your command line: Code: -- ... dict1.txt dict2.txt dict3.txt -- Easy as that.
M@LIK Very old oclHashcat-plus Support 8 27,314 10-15-2012, 11:40 PM