Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Is it possible to find the salt for a known password?
Post: RE: Is it possible to find the salt for a known pa...

If it's static across all users then it's not a salt, it's a shared secret -- AKA, "pepper." But my advice still stands. Use -m 1410 and supply the hash in "hash:salt" format. Or in this case, "has...
epixoip Old hashcat Support 6 10,995 01-17-2015, 11:54 PM
    Thread: Is it possible to find the salt for a known password?
Post: RE: Is it possible to find the salt for a known pa...

Cool, glad you got it sorted.
epixoip Old hashcat Support 6 10,995 01-18-2015, 07:13 AM
    Thread: [help] Unknown option --output-file= "error"
Post: RE: [help] Unknown option --output-file= "error"

because --output-file is not a valid option. read --help, read the wiki. also you're using an old version of hashcat.
epixoip Old hashcat Support 9 12,627 02-08-2015, 12:26 AM
    Thread: only cracking the first part ?
Post: RE: only cracking the first part ?

Sorry, this is not possible. Also your math is wrong, the keyspace would be 95^35. Not that it really matters.
epixoip Old hashcat Support 3 5,877 02-08-2015, 12:28 AM
    Thread: only cracking the first part ?
Post: RE: only cracking the first part ?

You would be able to reduce the keyspace with a targeted mask attack, but I don't think it will matter much.
epixoip Old hashcat Support 3 5,877 02-08-2015, 02:03 AM
    Thread: [help] Unknown option --output-file= "error"
Post: RE: [help] Unknown option --output-file= "error"

The video on youtube was likely using a very old version. Read the documentation. Understand what you are typing, and why.
epixoip Old hashcat Support 9 12,627 02-08-2015, 02:04 AM
    Thread: how to limit password character length
Post: RE: how to limit password character length

https://hashcat.net/wiki/doku.php?id=rule_based_attack You could use '6 or
epixoip Old hashcat Support 10 16,257 03-02-2015, 06:08 AM
    Thread: how to limit password character length
Post: RE: how to limit password character length

No, like this: Code: -- echo "
epixoip Old hashcat Support 10 16,257 03-02-2015, 06:30 AM
    Thread: how to limit password character length
Post: RE: how to limit password character length

Works here: Code: -- epixoip@token:~$ echo "
epixoip Old hashcat Support 10 16,257 03-02-2015, 06:44 AM
    Thread: how to limit password character length
Post: RE: how to limit password character length

Too much overhead checking the length of each candidate. You can try using the other rule instead. Edit the rule file and replace
epixoip Old hashcat Support 10 16,257 03-02-2015, 06:54 AM
    Thread: how to limit password character length
Post: RE: how to limit password character length

Yeah, slightly faster but not near as fast as not filtering at all. String manipulation is just too slow. So in this case what I'd suggest doing is pre-filtering your wordlist. Code: -- awk '...
epixoip Old hashcat Support 10 16,257 03-02-2015, 07:10 AM
    Thread: append a WORD in rules..
Post: RE: append a WORD in rules..

This is what the combinator attack is designed for, but you can use rules if you really want to. The way you identified using single-char append is the only way to do it.
epixoip Old hashcat Support 7 12,046 03-02-2015, 12:48 PM
    Thread: Whirlpool + salt?
Post: RE: Whirlpool + salt?

use -m 6100 and manually add the salt with each attack
epixoip Old hashcat Support 5 11,032 03-10-2015, 11:05 AM
    Thread: Whirlpool + salt?
Post: RE: Whirlpool + salt?

Yes, it's possible. I just told you how. Use -m 6100, and manually append the salt with each attack. Treat the salt as part of the password candidate you're attacking. For example if the salt is '1...
epixoip Old hashcat Support 5 11,032 03-10-2015, 10:34 PM
    Thread: Apples Password Helper
Post: RE: Apples Password Helper

You hijacked someone else's thread by posting your own question on someone else's question. This is against the forum rules, and also why your question was split out into a separate thread. No, Has...
epixoip Old hashcat Support 6 10,926 03-11-2015, 11:14 AM
    Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms

On CPU or GPU (or both)?
epixoip Old hashcat Support 12 20,948 04-22-2015, 09:52 PM
    Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms

You are correct, that would be cool to have in hashcat. And John the Ripper actually already has such functionality on CPU (see doc/DYNAMIC), but not GPU. I actually started work on a project a cou...
epixoip Old hashcat Support 12 20,948 04-22-2015, 09:31 PM
    Thread: Custom Hashing Algorithms
Post: RE: Custom Hashing Algorithms

Welp, there's my motivation right there :P I'M GONNA PROVE YOU WRONG, JENS! :)
epixoip Old hashcat Support 12 20,948 04-24-2015, 03:50 AM
    Thread: Can't crack salted sha1 hashes from mac (line length exeption)
Post: RE: Can't crack salted sha1 hashes from mac (line ...

OSX 10.6 is -m 122, not -m 100. You also are not formatting the hash correctly. See https://hashcat.net/wiki/doku.php?id=example_hashes In your MD5 attack it appears the wordlist you are attempting ...
epixoip Old hashcat Support 2 6,362 05-09-2015, 03:29 AM
    Thread: cracking sha256 with a 2 digit salt
Post: RE: cracking sha256 with a 2 digit salt

If you didn't obtain the salts along with the hashes, then you'll need to crack the salts along with the hashes. This is trivial since the salt is only two digits. Basically you'd just use -m 1400 and...
epixoip Old hashcat Support 5 12,594 06-07-2015, 02:40 AM