Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow

Your speed depends on the number of iterations. You can only achieve the same speed as the benchmark with a hash that has the same number of iterations (or less).
undeath hashcat 3 2,011 10-29-2018, 11:10 AM
    Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed

why are you using --force? You can use hashmode 99999, save your plaintext password to the "hash" file and run the attack against your actual plaintext.
undeath hashcat 4 2,788 10-30-2018, 01:37 AM
    Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat

Either you implement a kernel on your own for such a hash mode or you do the encoding externally and pipe in the already base64-encoded words in a0 mode, but this will cost quite some performance and ...
undeath hashcat 3 2,375 10-30-2018, 09:42 AM
    Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough

hashcat doesn't magically find the file for you on your system. Give the full path if it's not in your cwd. What does this have to do with /etc/shadow at all?
undeath hashcat 12 7,528 10-30-2018, 09:18 PM
    Thread: Word generation to test cracking speed
Post: RE: Word generation to test cracking speed

You can learn hashcat's functionality much better by just using the command line and built it yourself using the information on --help
undeath hashcat 4 2,788 10-31-2018, 12:33 PM
    Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough

Don't use --force and report resulting problems on here. Fix your problems.
undeath hashcat 12 7,528 10-31-2018, 12:34 PM
    Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough

Well, remove --force and see what problems hashcat reports and fix them?!
undeath hashcat 12 7,528 10-31-2018, 10:20 PM
    Thread: brain-server
Post: RE: brain-server

hashcat --brain-server for more info see https://hashcat.net/forum/thread-7903.html
undeath hashcat 4 4,680 11-02-2018, 12:52 AM
    Thread: recovering Idrac password
Post: RE: recovering Idrac password

what is your password? how did you generate the hash?
undeath hashcat 4 2,694 11-04-2018, 12:35 PM
    Thread: recovering Idrac password
Post: RE: recovering Idrac password

If you had posted the plaintext as requested it had been easier to help you. You need to add --hex-salt
undeath hashcat 4 2,694 11-04-2018, 12:57 PM
    Thread: How to crack custom hash - SHA512, SHA256, and MD5 combined
Post: RE: How to crack custom hash - SHA512, SHA256, and...

You'd have to write your own kernel for that.
undeath hashcat 3 3,429 11-04-2018, 11:31 PM
    Thread: hashcat v5.0.0
Post: RE: hashcat v5.0.0

see "Commandline Options" in the first post…
undeath hashcat 11 50,025 11-05-2018, 02:56 PM
    Thread: OpenCL problem
Post: RE: OpenCL problem

don't run hashcat in a VM
undeath hashcat 5 6,486 11-06-2018, 10:39 AM
    Thread: Salt input and bruteforcing
Post: RE: Salt input and bruteforcing

is the "number(1 to 9).1234567890876543" part fixed? If so you should add it to the salt. You don't need to define ?1 for a single character. You can simply use that character in the mask.
undeath hashcat 3 2,136 11-09-2018, 12:17 PM
    Thread: md5($salt1,password,$salt2) ?
Post: RE: md5($salt1,password,$salt2) ?

Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.
undeath hashcat 5 3,104 11-09-2018, 12:20 PM
    Thread: Combinator help
Post: RE: Combinator help

why are you even trying to use -a 6? That's a completely different attack mode. Use -a 0 and pipe in princeprocessor.
undeath hashcat 3 3,013 11-19-2018, 12:04 PM
    Thread: hashcat 5.0.0 with Token length exception with sha1
Post: RE: hashcat 5.0.0 with Token length exception with...

also note that you probably intended to run Code: -- echo "foo:$(echo -n bar | sha1sum | cut -d ' ' -f 1)" --
undeath hashcat 3 8,195 11-19-2018, 07:36 PM
    Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...

32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7). All other security properties are trivially fulfilled under...
undeath hashcat 2 2,089 11-20-2018, 01:48 AM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

https://hashcat.net/forum/thread-7686.html?highlight=stdin
undeath hashcat 12 18,677 11-21-2018, 11:43 PM
    Thread: bruteforce wpa2 from 9999999999 to 6000000000 in decreasing order
Post: RE: bruteforce wpa2 from 9999999999 to 6000000000 ...

https://hashcat.net/wiki/doku.php?id=mask_attack
undeath hashcat 7 4,636 11-22-2018, 11:53 AM