Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: ERROR: cuMemAllocHost() 2
Post: RE: ERROR: cuMemAllocHost() 2

You're not answering the most important question: 32GB total, or 32GB free? Are you observing the memory utilization while running hashcat? It's not "normal," but it all depends on what else is run...
epixoip Hardware 13 19,373 09-09-2015, 09:49 PM
    Thread: ERROR: cuMemAllocHost() 2
Post: RE: ERROR: cuMemAllocHost() 2

A lot of people on the forums have reported issues and crashes on Windows 10. Might want to try another OS.
epixoip Hardware 13 19,373 09-10-2015, 04:29 AM
    Thread: ERROR: cuMemAllocHost() 2
Post: RE: ERROR: cuMemAllocHost() 2

Ok. Well in the meantime I would advise observing memory utilization while the benchmark is running, maybe you can pinpoint which algorithm is causing you to run out of RAM. Or if there's just a memor...
epixoip Hardware 13 19,373 09-12-2015, 02:43 AM
    Thread: Trying to crack NTLMv2
Post: RE: Trying to crack NTLMv2

NTLMv2 is not -m 1000.
epixoip Old hashcat Support 13 28,836 05-09-2016, 05:47 PM
    Thread: Trying to crack NTLMv2
Post: RE: Trying to crack NTLMv2

No, -m 0 is MD5. Somebody needs to do some reading.
epixoip Old hashcat Support 13 28,836 05-09-2016, 06:41 PM
    Thread: Trying to crack NTLMv2
Post: RE: Trying to crack NTLMv2

Articles? How about you start by reading --help. Then if you do not understand --help, read the wiki. If you need help interpreting the wiki, read the FAQ. If you're still lost, then post your questio...
epixoip Old hashcat Support 13 28,836 05-09-2016, 06:47 PM
    Thread: Trying to crack NTLMv2
Post: RE: Trying to crack NTLMv2

I have no idea what "SMB scanner" is, I think most people use https://github.com/SpiderLabs/Responder
epixoip Old hashcat Support 13 28,836 05-09-2016, 07:14 PM
    Thread: Extract PDF hash (edit passwd)
Post: RE: Extract PDF hash (edit passwd)

Hashcat only supports cracking encrypted PDFs. Usually when only an edit password is applied, the document is not encrypted. You can use one of many freely-available tools to simply strip out the edit...
epixoip hashcat 13 59,850 01-25-2017, 09:41 PM
    Thread: Extract PDF hash (edit passwd)
Post: RE: Extract PDF hash (edit passwd)

As I said above, Hashcat only supports encrypted PDFs. It does not support cracking edit passwords.
epixoip hashcat 13 59,850 01-26-2017, 03:16 AM
    Thread: 2x6 gtx1080 cluster
Post: RE: 2x6 gtx1080 cluster

Moved it out of Hashcat Support since you're not seeking support for Hashcat. The official Hashcat way is to use --keyspace, --skip, and --limit. But using these directly can be a bit cumbersome. S...
epixoip General Talk 13 13,619 02-19-2017, 09:46 PM
    Thread: 2x6 gtx1080 cluster
Post: RE: 2x6 gtx1080 cluster

There is a genuinely-supported, distributed flavor of Hashcat: it's called Hashstack.
epixoip General Talk 13 13,619 03-05-2017, 04:38 AM
    Thread: 2x6 gtx1080 cluster
Post: RE: 2x6 gtx1080 cluster

None of the open source solutions like Hashtopussy are genuinely supported, I don't see winxp5421 and s3in!c selling support packages or giving out a 1-800 customer support number. Also, open source s...
epixoip General Talk 13 13,619 05-24-2017, 03:28 AM
    Thread: Integer overflow detected while brute forcing
Post: RE: Integer overflow detected while brute forcing

@kjs: Wait, you're over on Hashkiller advertising Hashcat rigs for sale, but you don't even know what datatypes Hashcat uses internally? Good luck with that, I'm sure your customers have much faith in...
epixoip hashcat 13 22,739 05-24-2017, 04:33 AM
    Thread: 2x6 gtx1080 cluster
Post: RE: 2x6 gtx1080 cluster

Oh, yeah, no, the shade was directed at kjs, not at you.
epixoip General Talk 13 13,619 05-24-2017, 08:17 PM
    Thread: 2x6 gtx1080 cluster
Post: RE: 2x6 gtx1080 cluster

@winxp5421 please correct me if I said something that was incorrect, but as far as I know, you only offer community support via Github Issues. But don't get me wrong, Hashtopussy is a massive improvem...
epixoip General Talk 13 13,619 05-24-2017, 06:39 AM
    Thread: Integer overflow detected while brute forcing
Post: RE: Integer overflow detected while brute forcing

First, stop begging me to call you. I'm not going to call you or speak to you in private, I have no use for your words. My problem, Kristoffer, is that you came out of nowhere and started posting ove...
epixoip hashcat 13 22,739 05-24-2017, 09:34 AM
    Thread: Integer overflow detected while brute forcing
Post: RE: Integer overflow detected while brute forcing

TofuBoy22 Wrote: (05-24-2017, 10:41 AM) -- For those who weren't around then.... who were these SL3 shitbags that you talk about :) -- Phone unlockers. They were greedy, demanding, disrespectful lee...
epixoip hashcat 13 22,739 05-24-2017, 12:30 PM
    Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?

It's not an error, it's purely informational. You can also shorten your command line up quite a bit by using -1 ?d?l?u instead of manually listing out all of the characters in the character set.
epixoip hashcat 13 12,980 06-19-2017, 10:15 PM
    Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?

Sorry I didn't realize the length of your mask was 12 bytes long. Hashcat stores keyspace as a uint64 and 62^12 is greater than 2^64-1, hence it is causing an integer overflow, and that's why Hashcat ...
epixoip hashcat 13 12,980 06-20-2017, 01:59 AM
    Thread: Is this WPA2 Password uncrackable?
Post: RE: Is this WPA2 Password uncrackable?

No, I don't think so. https://www.wolframalpha.com/input/?i=is+62%5E12+greater+than+(2%5E64-1) https://www.wolframalpha.com/input/?i=62%5E12+to+base+16 (click More under Other Data Types) Quo...
epixoip hashcat 13 12,980 06-20-2017, 06:23 PM