Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: beginner help, best method?
Post: RE: beginner help, best method?

No reason to use maskprocessor for such a simple mask attack. WPA is a rather slow hash mode and nine characters is rather long for a brute force. Find more clever attacks or die cracking.
undeath hashcat 6 3,771 05-12-2018, 11:34 AM
    Thread: Hashcat 4.1.0 slow speed
Post: RE: Hashcat 4.1.0 slow speed

static mask prefix is bad for performance
undeath hashcat 6 3,903 05-12-2018, 11:30 AM
    Thread: Hashcat piping doesn't work (WPA/2)
Post: RE: Hashcat piping doesn't work (WPA/2)

Are you able to crack the password using a different method than piping? mask attack, normal wordlist attack, …
undeath User Contributions 4 6,411 05-11-2018, 11:28 AM
    Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...

yes, the password length in combination with "brute force"
undeath Hardware 10 8,020 05-08-2018, 09:59 PM
    Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...

I'd invest in a simple calculator.
undeath Hardware 10 8,020 05-08-2018, 09:54 PM
    Thread: Tesla P100 / HC 4.1.0 Benchmarks on Google Cloud
Post: RE: Tesla P100 / HC 4.1.0 Benchmarks on Google Clo...

In all the benchmark numbers you have posted, were you using the same hash or different hashes?
undeath Hardware 5 6,941 05-08-2018, 11:10 AM
    Thread: [Copying] for a long time
Post: RE: [Copying] for a long time

efficient attack, ugly edition: combine salt with each dict word and run -a3 with the mask only alternatively use --stdout and simply pipe in the -a6 candidates. You don't have proper status but it's...
undeath hashcat 5 3,426 05-07-2018, 09:26 PM
    Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working

Your nvidia opencl runtime, not your intel one. Try reinstalling the graphics driver.
undeath hashcat 4 3,114 05-07-2018, 07:24 PM
    Thread: [Copying] for a long time
Post: RE: [Copying] for a long time

dict is too small. You might need to do this attack differently.
undeath hashcat 5 3,426 05-07-2018, 07:23 PM
    Thread: hashcat64 has stopped working
Post: RE: hashcat64 has stopped working

sounds like a broken opencl runtime. Does the same happen without -t option?
undeath hashcat 4 3,114 05-07-2018, 05:20 PM
    Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM

@ktinoulas: you are talking about an early-reject in the 5500 kernel. Looks like this is already implemented: https://github.com/hashcat/hashcat/blob/f6cfcbbc3a37e9b0ef9448f7d70f9013b65bd027/OpenCL/m0...
undeath User Contributions 18 36,659 05-07-2018, 05:13 PM
    Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?

It could also be some custom scheme. There is an unlimited number of ways to do salted iterated hashing.
undeath hashcat 5 5,007 05-01-2018, 03:50 PM
    Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?

first you need to find out how exactly the hash is generated
undeath hashcat 5 5,007 05-01-2018, 03:30 PM
    Thread: Need Help On Weird Problem
Post: RE: Need Help On Weird Problem

A fundamental feature of a cryptographic hash function is that this is not possible. So no.
undeath hashcat 3 2,661 04-30-2018, 09:06 PM
    Thread: Can anyone help me
Post: RE: Can anyone help me

you haven't happened to follow the suggestions hashcat gave you, have you? Quote: -- You are STRONGLY encouraged to use the drivers listed in docs/readme.txt. --
undeath hashcat 3 3,116 04-27-2018, 06:13 PM
    Thread: Line-length exception
Post: RE: Line-length exception

hashcat cannot find your hash file.
undeath hashcat 2 2,006 04-26-2018, 11:45 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

targeted wordlists, targeted rules, more narrow masks, …
undeath hashcat 16 9,677 04-25-2018, 11:24 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4 Other than that the most time you can save by running clever attacks.
undeath hashcat 16 9,677 04-25-2018, 05:59 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command?
undeath hashcat 16 9,677 04-25-2018, 01:06 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

how did you create the hash?
undeath hashcat 16 9,677 04-25-2018, 12:05 PM