Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Possible to do attack mode 6 and 7 on same attack
Post: RE: Possible to do attack mode 6 and 7 on same att...

The dict I want to use is only 2184 words… so I did this: Code: -- ./hashcat -O -w3 -a7 ?a?a dict.txt --stdout > prependaa.txt ./maskprocessor-0.73/mp64.app '$?a$?a$?a$?a' > appendaaaa.rule -- ...
walterlacka hashcat 6 5,301 12-20-2017, 05:43 PM
    Thread: Begginer cracking
Post: RE: Begginer cracking

Hahha.. in what format should we respond to you if your head will fall off if we respond with numbers?
walterlacka Hardware 6 5,743 03-22-2018, 08:47 PM
    Thread: Begginer cracking
Post: RE: Begginer cracking

In your case you have 14 potential (2-9 and a-f).  And that is of length 10.  That would be 14^10.  Take that and divide by the rate at which you can hash and you'll find your answer.
walterlacka Hardware 6 5,743 03-22-2018, 09:14 PM
    Thread: Question about hccapx file
Post: RE: Question about hccapx file

IIRC, I think I needed to add a library or something first. If you poke around this forum, I think there may be a post that talks about this.
walterlacka General Talk 6 4,363 06-05-2018, 02:49 PM
    Thread: Help with cracking a zip Password
Post: RE: Help with cracking a zip Password

Any difference if you do this? hashcat64 -a 3 -1 abcdef1234567890+- test.hash ?1?1?1?1?1?1?1?1?1?1
walterlacka hashcat 5 24,593 11-30-2017, 10:39 PM
    Thread: Help with cracking a zip Password
Post: RE: Help with cracking a zip Password

You'll need a -m parameter as well.
walterlacka hashcat 5 24,593 12-01-2017, 01:03 AM
    Thread: Weird estimated time
Post: RE: Weird estimated time

7 character for WPA???!!!?  Thought you needed 8.
walterlacka hashcat 5 3,462 06-05-2018, 02:48 PM
    Thread: crackingxkcd with a combinator attack and a sizeable dictionary [HELP]
Post: RE: crackingxkcd with a combinator attack and a si...

I asked a similar question recently, and was pointed to using princeprocessor. See: Code: -- https://hashcat.net/forum/thread-7147-post-38383.html -- Hope this helps.
walterlacka hashcat 4 3,324 01-01-2018, 08:20 PM
    Thread: Single 15 char NTLM Hash with known info
Post: Single 15 char NTLM Hash with known info

Trying to crack a single 15-length NTLM hash.  I know the following: 1 - special 1 - upper 13 - lower no - digits consists of 6 words (no spaces) it's a phrase Assume cracking rig has 2 GTX1...
walterlacka General Talk 4 3,363 12-31-2017, 01:55 AM
    Thread: Single 15 char NTLM Hash with known info
Post: RE: Single 15 char NTLM Hash with known info

Thanks for the suggestion - I'll give it a try. One question though - since I want to take advantage of GPU as much as possible, and with this being fast hash, I'll be using either the prince_optim...
walterlacka General Talk 4 3,363 01-01-2018, 08:17 PM
    Thread: crackingxkcd with a combinator attack and a sizeable dictionary [HELP]
Post: RE: crackingxkcd with a combinator attack and a si...

To get a better understanding of how the tool works, I created a small dictionary of 5 words and ran the tool against it. I watched on my screen the candidates it produced. I also used the --help sw...
walterlacka hashcat 4 3,324 01-01-2018, 08:53 PM
    Thread: Prince processor capability
Post: RE: Prince processor capability

Does the --elem-cnt-min=4 and --elem-cnt-max=4 help?
walterlacka hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 4 4,503 01-04-2018, 01:34 AM
    Thread: Prince processor capability
Post: RE: Prince processor capability

Code: -- cat dict.txt this orange rocks and -- Code: -- ./pp64.app --elem-cnt-min=4 --elem-cnt-max=4 --pw-max=20 < dict.txt andandandand andandandthis andandthisand andthisandand this...
walterlacka hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 4 4,503 01-04-2018, 05:07 PM
    Thread: How to save progress with PRINCE ?
Post: RE: How to save progress with PRINCE ?

Check this thread as well - in Royce's response, it shows how to script this such that you don't need to know the -s value before running from the CLI: https://hashcat.net/forum/thread-7166.html
walterlacka hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 4 3,617 08-22-2018, 09:37 PM
    Thread: Will HD7970 (R9 280X) still work with Hashcat?
Post: Will HD7970 (R9 280X) still work with Hashcat?

I'm dusting off an older rig from a couple years ago that has 2X HD7970 GPU's in it ( I believe they are the same thing as R9 280X.).  Yeah, I realize that AMD isn't what it used to be for cracking ...
walterlacka Hardware 3 4,389 11-03-2017, 11:54 PM
    Thread: Will HD7970 (R9 280X) still work with Hashcat?
Post: RE: Will HD7970 (R9 280X) still work with Hashcat?

Thanks for the replies.  I ended up loading Win 10 and the latest Radeon Crimson drivers and it's now working.  Not ideal, but for now gets the job done.
walterlacka Hardware 3 4,389 11-07-2017, 04:09 PM
    Thread: Using PACK - Interesting Results
Post: Using PACK - Interesting Results

New to using PACK so maybe using it incorrectly.. here's what I'm seeing: Code: -- python policygen.py --minlength=9 --maxlength=9 --mindigit=1 --maxdigit=3 --minspecial=1 --maxspecial=2 --minuppe...
walterlacka General Talk 3 3,367 12-01-2017, 04:02 AM
    Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results

That worked.  Thanks philsmd.
walterlacka General Talk 3 3,367 12-01-2017, 03:03 PM
    Thread: Using PACK - Interesting Results
Post: RE: Using PACK - Interesting Results

Now I've got myself thoroughly confused.. I ran the following (using the fix that philsmd pointed me to): Code: -- [*]Using 12,000,000,000 keys/sec for calculations. [*]Password policy:    P...
walterlacka General Talk 3 3,367 12-02-2017, 06:03 PM
    Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...

Does this work? ./hashcat -w 4 -m 2500 -a 3 Dump.hccapx -1 ABDF 071?1?1?d?1?1?14 Couldn't tell based on the BOLD which was -1 and which was -l (bad eyes)
walterlacka hashcat 3 2,888 03-16-2018, 07:26 PM