Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: Bitcoin2hashcat.py and sensitive info
Post: RE: Bitcoin2hashcat.py and sensitive info

Sharing your BTC wallet "hash" is not safe because it includes your encrypted privkey, which is needed to crack the password. Once cracked someone can decrypt your privkey and steal your BTC. I don't...
undeath hashcat 2 2,795 12-04-2018, 04:54 PM
    Thread: Multiple GPU'S
Post: RE: Multiple GPU'S

try it?!
undeath Hardware 2 3,274 12-02-2018, 02:09 PM
    Thread: Extensible Build Review
Post: RE: Extensible Build Review

MrMeeseeks Wrote: (11-30-2018, 10:38 PM) -- and they draw way too much power (enough to damage the motherboard.) -- Has Nvidia pulled an AMD on the new cards? It's the first time I hear Nvidia card...
undeath Hardware 6 4,890 12-01-2018, 01:25 PM
    Thread: Incorrect results
Post: RE: Incorrect results

only if you have a vm that has pcie passthrough
undeath hashcat 13 7,066 11-29-2018, 11:25 PM
    Thread: Incorrect results
Post: RE: Incorrect results

don't run inside a vm and install the appropriate opencl runtime for your device.
undeath hashcat 13 7,066 11-29-2018, 11:13 PM
    Thread: Incorrect results
Post: RE: Incorrect results

why are you using --force? Did you read the associated warning?
undeath hashcat 13 7,066 11-29-2018, 01:22 AM
    Thread: Incorrect results
Post: RE: Incorrect results

Please provide the exact command you ran and the files (wordlists) you used. What hardware are you using? What hashcat version are you using? Are you able to reproduce the problem with a different has...
undeath hashcat 13 7,066 11-28-2018, 11:38 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel.
undeath hashcat 12 18,677 11-28-2018, 02:41 PM
    Thread: Masking??? (Noob)
Post: RE: Masking??? (Noob)

thanks for the corrections, philsmd. Was a bit in a hurry when typing that.
undeath hashcat 3 2,286 11-28-2018, 01:56 PM
    Thread: Masking??? (Noob)
Post: RE: Masking??? (Noob)

1. generate a list for the first part hashcat --stdout -a3 -1 aA -2 bB -3 cC ?1?2?3 -o part1.txt 2. create a file part2.txt that has the three variations of the known parts 3. combine part1 + part2 ...
undeath hashcat 3 2,286 11-27-2018, 11:28 AM
    Thread: Won't start cracking (beginner)
Post: RE: Won't start cracking (beginner)

soxrok2212 Wrote: (11-26-2018, 03:32 PM) -- You specify attack mode 3 (mask) but you don’t provide a mask so there is no work to  be done. -- hashcat uses a default mask (which is possibly not w...
undeath Hardware 4 3,801 11-26-2018, 09:39 PM
    Thread: Need help with setup
Post: RE: Need help with setup

add -O
undeath General Talk 2 2,737 11-26-2018, 07:12 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Mem5 Wrote: (11-23-2018, 12:14 AM) -- Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds. -- With cost factor 12? I think you're being a little too optimistic :D
undeath hashcat 12 18,677 11-23-2018, 04:50 PM
    Thread: Performance issues RTX 2070 in hashcat.
Post: RE: Performance issues RTX 2070 in hashcat.

-O was a major change. You'd have read about it in the release notes.
undeath Hardware 4 7,944 11-22-2018, 10:27 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible.
undeath hashcat 12 18,677 11-22-2018, 06:14 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

brute-forcing bcrypt is not feasible.
undeath hashcat 12 18,677 11-22-2018, 05:36 PM
    Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...

https://hashcat.net/wiki/doku.php?id=mask_attack
undeath hashcat 7 4,636 11-22-2018, 11:53 AM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

https://hashcat.net/forum/thread-7686.html?highlight=stdin
undeath hashcat 12 18,677 11-21-2018, 11:43 PM
    Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...

32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7). All other security properties are trivially fulfilled under...
undeath hashcat 2 2,089 11-20-2018, 01:48 AM
    Thread: hashcat 5.0.0 with Token length exception with sha1
Post: RE: hashcat 5.0.0 with Token length exception with...

also note that you probably intended to run Code: -- echo "foo:$(echo -n bar | sha1sum | cut -d ' ' -f 1)" --
undeath hashcat 3 8,195 11-19-2018, 07:36 PM