Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: double md5 not working
Post: RE: double md5 not working

damn, forgot to upgrade my drivers :/ Thank you.
undeath Very old oclHashcat-plus Support 2 6,110 09-18-2012, 09:26 PM
    Thread: double md5 not working
Post: double md5 not working

Double md5 (2600) does not seem to work for me using latest plus version. No matter what ruleset and wordlist i use, there are 0 cracks. Used the cpu version and had multiple cracks with the same r...
undeath Very old oclHashcat-plus Support 2 6,110 09-18-2012, 09:20 PM
    Thread: charset and unicode
Post: RE: charset and unicode

shouldn't utf-8 work just as fine as ascii? Default garbage in, garbage out mentality?
undeath Very old oclHashcat-plus Support 7 13,062 09-16-2012, 12:38 PM
    Thread: hashcat working on by far more passwords than wordlist
Post: RE: hashcat working on by far more passwords than ...

post the command line or a screenshot of the gui with all your options.
undeath Very old oclHashcat-plus Support 4 9,238 09-08-2012, 11:08 AM
    Thread: Two Question about bruteforce password vbb
Post: RE: Two Question about bruteforce password vbb

1. because you are an incompetent scripting kiddy. 2. the mask has to be at least the length to be bruteforced at maximum, say 10 times ?l for a 10 char password
undeath Old hashcat Support 4 9,607 08-20-2012, 07:26 PM
    Thread: MD5(salt.pass)
Post: RE: MD5(salt.pass)

for GPU cracking you can try OSC, but it is probably limited to two character salts.
undeath General Help 7 20,325 08-16-2012, 01:55 AM
    Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack

oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e...
undeath Beta Tester 11 10,338 08-13-2012, 10:53 AM
    Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack

Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4.
undeath Beta Tester 11 10,338 08-13-2012, 10:50 AM
    Thread: Error when cracking Domain Cashed Credentials - ms-cache
Post: RE: Error when cracking Domain Cashed Credentials ...

mscash is salted by the username. you need to supply hash:username
undeath General Help 2 17,416 08-08-2012, 03:24 PM
    Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?

if you only need to store user passwords, store a base64 encoded string of the hash.
undeath General Talk 5 15,747 08-07-2012, 07:45 PM
    Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me

seems fine. WPA is slow.
undeath Very old oclHashcat-plus Support 14 19,507 08-06-2012, 06:18 PM
    Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks

OSC is md5(salt.pass), however it is not supported by lite. Read my other post.
undeath Very old oclHashcat-lite Support 20 40,862 08-06-2012, 01:58 AM
    Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks

uhm, sorry. Seems like OSC is not supported by lite. Due to the way lite works you should not use a mask like 12345678?1?1?1?1 ... because lite relies on the first part of the plaintext not to be fixe...
undeath Very old oclHashcat-lite Support 20 40,862 08-06-2012, 01:26 AM
    Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks

you can try the OSC hash mode.
undeath Very old oclHashcat-lite Support 20 40,862 08-06-2012, 12:59 AM
    Thread: Seperator unmatched error
Post: RE: Seperator unmatched error

there is obviously no salt supplied. Also your "sha1" hash is 24bytes long, not 20 like it is supposed to be.
undeath Old hashcat Support 1 6,301 08-05-2012, 05:46 PM
    Thread: SHA1 Customized Algorithm
Post: RE: SHA1 Customized Algorithm

save the hashes as hash:USER: (notice the trailing colon) and use a rule to ensure every password is only tested in upper case. then you can use sha1(salt.pass)
undeath Very old oclHashcat-lite Support 5 11,207 08-03-2012, 01:06 PM
    Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me

Code: -- 8--gpu-loops 256 -- you are missing a blank and you are still missing a mask
undeath Very old oclHashcat-plus Support 14 19,507 08-02-2012, 11:18 PM
    Thread: brute-forcing not working with me
Post: RE: brute-forcing not working with me

you did not specify a mask. Also you have to quote your hash file.
undeath Very old oclHashcat-plus Support 14 19,507 08-01-2012, 11:20 PM
    Thread: Restructuring pot file
Post: RE: Restructuring pot file

yes, that would be a nicely working solution, too!
undeath Feature Requests 4 9,885 07-31-2012, 04:40 PM
    Thread: Restructuring pot file
Post: RE: Restructuring pot file

With the current pot file you cannot tell apart salt from plain if the salt contains a colon. If you prepend the salt to the hash you can easily make a regex to find the plain. ^.*\$[0-9a-f]{32,}:(?P....
undeath Feature Requests 4 9,885 07-31-2012, 04:03 PM