Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

can you post your full command line?
undeath hashcat 8 6,282 03-02-2018, 12:24 AM
    Thread: Am i wasting my time?
Post: RE: Am i wasting my time?

You don't have to clean your cap and in fact it's not even recommended. Since it's your network and you know the passphrase you can simply put it into your wordlist for an easy and quick test.
undeath hashcat 3 3,217 03-03-2018, 12:24 AM
    Thread: Help with mask
Post: RE: Help with mask

wordlist.txt Code: -- boats -- numbers.rule Code: -- ^0 ^1 $0 $1 : -- exclamation_mark.rule Code: -- $! : -- toggle0.rule Code: -- T0 : -- toggle1.rule Code: -- T1 : -- toggle2.rule Code: -...
undeath hashcat 5 3,954 03-03-2018, 02:20 PM
    Thread: Help with mask
Post: RE: Help with mask

Just a note, you can severely speed up the attack because your dictionary is very small here. Code: -- hashcat --stdout wordlist.txt -r toggle0.rule -r toggle1.rule -r toggle2.rule -r toggle3.rule -...
undeath hashcat 5 3,954 03-03-2018, 03:36 PM
    Thread: Help with mask
Post: RE: Help with mask

This particular attack only has 40000 candidates. Running the second command on your laptop will likely be faster than running the first command on your gaming rig.
undeath hashcat 5 3,954 03-03-2018, 03:58 PM
    Thread: New hashcat freezes or very slow
Post: RE: New hashcat freezes or very slow

try -w2
undeath hashcat 2 2,293 03-04-2018, 01:08 PM
    Thread: Hashcat does not seen password in the dictionarry
Post: RE: Hashcat does not seen password in the dictiona...

run with --potfile-disable otherwise hashcat will skip already cracked hashes. Quote: -- INFO: Removed 5 hashes found in potfile. --
undeath hashcat 2 2,694 03-04-2018, 02:16 PM
    Thread: Trying to install hashcat on Windows 7 with AMD help
Post: RE: Trying to install hashcat on Windows 7 with AM...

5770 is too old and not supported by AMD any more (and thus hashcat). try with -D1 for CPU only
undeath hashcat 3 4,638 03-10-2018, 10:08 PM
    Thread: Fan speed problem with hashcat
Post: RE: Fan speed problem with hashcat

Are you using the latest version?
undeath hashcat 3 2,884 03-15-2018, 10:45 AM
    Thread: GPU runing two of six why?
Post: RE: GPU runing two of six why?

you are using -D1 which means only CPU.
undeath hashcat 4 4,143 03-15-2018, 10:45 PM
    Thread: GPU runing two of six why?
Post: RE: GPU runing two of six why?

scrypt is designed to be extremely slow on GPU so that result is expected.
undeath hashcat 4 4,143 03-16-2018, 10:56 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

What do you mean by "unknown text"? What is the technical difference to a password?
undeath hashcat 9 5,500 03-16-2018, 10:59 AM
    Thread: speed reduce in using rules to generate keys
Post: RE: speed reduce in using rules to generate keys

what do you mean by "very low speed"? how do you measure it?
undeath hashcat 3 3,323 03-16-2018, 11:02 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

isn't that just the same as hmac-sha1(key = $pass)? edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt)
undeath hashcat 9 5,500 03-16-2018, 11:19 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

you should be able to crack this by using dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160
undeath hashcat 9 5,500 03-16-2018, 11:29 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG
undeath hashcat 9 5,500 03-16-2018, 12:23 PM
    Thread: Difference between bruteforce and password list for WPA cracking
Post: RE: Difference between bruteforce and password lis...

what walterlacka wrote. You are missing B in your custom charset.
undeath hashcat 3 2,893 03-16-2018, 07:34 PM
    Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password

All your findings are correct. There is no "native" way to do such a mask attack.
undeath hashcat 5 3,851 03-17-2018, 07:15 PM
    Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password

You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix.
undeath hashcat 5 3,851 03-18-2018, 10:38 AM
    Thread: fast way to crack
Post: RE: fast way to crack

https://hashcat.net/wiki/doku.php?id=mask_attack But even with fast hardware a full brute-force is going to take ages on WPA.
undeath hashcat 2 2,261 03-18-2018, 11:21 AM