Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Nano Ledger S
Post: RE: Nano Ledger S

no
undeath General Talk 1 1,298 06-28-2019, 08:07 PM
    Thread: best approach?
Post: RE: best approach?

see https://hashcat.net/wiki/doku.php?id=mask_attack but you will have to narrow down the possibilities.
undeath General Talk 1 1,167 07-24-2019, 01:32 PM
    Thread: Determine if PKMID is dynamic?
Post: RE: Determine if PKMID is dynamic?

arniezonez Wrote: (08-14-2019, 04:55 PM) -- Would the opengl self test failing be responsible for this? -- LOL
undeath General Talk 5 2,379 08-14-2019, 05:01 PM
    Thread: LM Hashes
Post: RE: LM Hashes

The LM hashes are only used by old versions of AD servers, which is why they are sometimes kept iirc.
undeath General Talk 11 5,710 08-26-2019, 04:01 PM
    Thread: LM Hashes
Post: RE: LM Hashes

each NTLM hash should have two corresponding LM hashes, so you do not need to BF the second part of the password.
undeath General Talk 11 5,710 08-27-2019, 10:14 AM
    Thread: LM Hashes
Post: RE: LM Hashes

exactly It might be useful to convert the LM results to lower-case for that attack. You are likely to get hits a litte bit faster because passwords tend to mainly consist of lower case characters.
undeath General Talk 11 5,710 08-27-2019, 04:23 PM
    Thread: Parsing and counting salts in hashlists
Post: RE: Parsing and counting salts in hashlists

There is no generic way of doing it. Various formats have their own representation and encoding. See https://hashcat.net/wiki/doku.php?id=example_hashes for some examples.
undeath General Talk 2 1,189 09-20-2019, 12:57 PM
    Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $

PBKDF2-HMAC-SHA1 is supported by hashcat (mode 12000)
undeath General Talk 4 1,671 09-24-2019, 11:39 PM
    Thread: Script or tool for hashing lines needed
Post: RE: Script or tool for hashing lines needed

run them with --help
undeath General Talk 4 1,596 09-25-2019, 09:31 PM
    Thread: PMKID
Post: RE: PMKID

I guess the question was meant to ask "why can you not use the PMKID to authenticate with a AP". Answer is simple: because the PMKID is not used in the WPA handshake.
undeath General Talk 2 1,511 10-04-2019, 07:21 PM
    Thread: Best way to crack emails?
Post: RE: Best way to crack emails?

convert your email appendixes to a rules file and do a straight wordlist + rules attack.
undeath General Talk 3 1,906 10-06-2019, 11:31 AM
    Thread: Best way to crack emails?
Post: RE: Best way to crack emails?

yes. And then you can apply additional rules to whatever input wordlist/username list you use before that final domain ruleset.
undeath General Talk 3 1,906 10-07-2019, 11:28 AM
    Thread: Hash of office file need to be cracked.
Post: RE: Hash of office file need to be cracked.

you forgot to specify a wordlist
undeath General Talk 1 1,161 10-07-2019, 06:11 PM
    Thread: Decoding multiple PMKID SSIDs
Post: RE: Decoding multiple PMKID SSIDs

wlanhcxinfo of https://github.com/ZerBea/hcxtools should be able to do all you need.
undeath General Talk 4 2,073 10-13-2019, 12:07 PM
    Thread: WPA help
Post: RE: WPA help

standard wpa(2) is mode 2500. Unless you know what PMK or PMKID means you don't need them.
undeath General Talk 1 978 12-11-2019, 01:00 AM
    Thread: Save mask in wordlist
Post: RE: Save mask in wordlist

hashcat -a3 PAS?dWOR?d --stdout > list.txt
undeath General Talk 1 929 01-03-2020, 10:41 PM
    Thread: Dictionary Attack
Post: RE: Dictionary Attack

rockyou is a good wordlist but you should add rules. Hashcat ships a bunch. There is no way to guarantee cracking a hash though.
undeath General Talk 3 1,523 01-05-2020, 01:09 PM
    Thread: Can this password type be brute forced?
Post: RE: Can this password type be brute forced?

Assuming a theoretical hash rate of 1 TH/s (which is already very fast, even for a fast hash mode) you'd be looking at about 10^43 years of cracking. Pretty sure that's well beyond the expected end of...
undeath General Talk 2 1,226 01-10-2020, 01:08 PM
    Thread: Help with cracking a password to a PDF
Post: RE: Help with cracking a password to a PDF

hashcat does not use rainbow tables. And besides, I have no idea how your md5 is related to the pdf mentioned in the thread title.
undeath General Talk 2 1,069 02-16-2020, 02:08 PM
    Thread: Optimizing WPA recovery
Post: RE: Optimizing WPA recovery

you can simply concatenate hccapx files
undeath General Talk 4 1,529 02-20-2020, 06:10 PM