Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: scrypt hash format
Post: RE: scrypt hash format

You have to reformat the hashes for cracking with hascat. Hashcat's format is SCRYPT:n:r:p:salt:hash salt and hash are base64-encoded. I think hashcat only supports hash lengths of 32 bytes. You have...
undeath hashcat 2 1,189 08-12-2019, 11:19 AM
    Thread: odd pdf hash
Post: RE: odd pdf hash

I don't know if there are slight differences in john's and hashcat's format but you can try with this script: https://github.com/stricture/hashstack-server-plugin-hashcat/blob/master/scrapers/pdf2hash...
undeath hashcat 1 1,007 08-12-2019, 11:26 AM
    Thread: how to crack a windows 10 local user password hash(Netnlm capture)
Post: RE: how to crack a windows 10 local user password ...

-i does not accept any arguments, check --help for the correct usage
undeath hashcat 14 4,712 08-12-2019, 03:27 PM
    Thread: phpBB uses bcrypt
Post: RE: phpBB uses bcrypt

What exact change would you propose? Changing the mode 400 description to "phpBB
undeath hashcat 4 1,975 08-13-2019, 10:18 AM
    Thread: Can you resume if HC crashes?
Post: RE: Can you resume if HC crashes?

by default hashcat will create a session called "hashcat". You can restore the session by simply running "hashcat --restore".
undeath hashcat 5 1,762 08-13-2019, 11:58 AM
    Thread: Can you resume if HC crashes?
Post: RE: Can you resume if HC crashes?

"8 digit upper alpha" would be -1 ?d?u ?1?1?1?1?1?1?1?1 I guess you mean "8 characters upper alpha"?
undeath hashcat 5 1,762 08-13-2019, 03:31 PM
    Thread: I want to get the maximum of -S --skip before running hashcat
Post: RE: I want to get the maximum of -S --skip before ...

use the --keyspace argument
undeath hashcat 4 1,388 08-14-2019, 11:55 AM
    Thread: I want to get the maximum of -S --skip before running hashcat
Post: RE: I want to get the maximum of -S --skip before ...

you need to omit the hash when using --keyspace btw, if you're trying to set up distributed cracking you might be interested in https://github.com/s3inlc/hashtopolis
undeath hashcat 4 1,388 08-14-2019, 12:05 PM
    Thread: How to encrypt password with wpa2?
Post: RE: How to encrypt password with wpa2?

Ar76 Wrote: (08-14-2019, 06:33 PM) -- atom Wrote: (08-14-2019, 11:00 AM) -- But please, stop using the word encrypt, it hurts. -- So what's the correct terminology? -- to hash
undeath hashcat 9 3,132 08-15-2019, 07:23 PM
    Thread: hybrid attack can't use all gpu power?
Post: RE: hybrid attack can't use all gpu power?

you can pipe in from another instance like this: Code: -- hashcat -a 6 wordlist.txt -1 dig_symbols.charset ?1?1?1?1?1?1 --increment --stdout | hashcat -m 11300 hash.txt -- note that you won't be...
undeath hashcat 5 1,885 08-15-2019, 11:03 PM
    Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies

not supported. you need to preprocess the hash file.
undeath hashcat 6 1,858 08-16-2019, 12:08 AM
    Thread: Hashing NTLM with frequencies
Post: RE: Hashing NTLM with frequencies

hard to say, depends on the hash type and your vram and possibly the attack you're running.
undeath hashcat 6 1,858 08-17-2019, 12:07 AM
    Thread: Hashcat temperature control only works when one GPU used at a time?
Post: RE: Hashcat temperature control only works when on...

fan control mechnisms have been removed from hashcat.
undeath hashcat 3 1,408 08-18-2019, 05:22 PM
    Thread: Weird result with MSSQL 2000 mode 131
Post: RE: Weird result with MSSQL 2000 mode 131

A MSSQL 2000 hash consists of two hashes, one with the correct case and one with all upper case letters. Hashcat probably simply ignores one of them. see https://www.theregister.co.uk/2002/07/08/crac...
undeath hashcat 3 1,556 08-18-2019, 10:39 PM
    Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption

Don't use --force unless you are a developer. You should run more clever attacks than brute-force. For example dictionary+rules.
undeath hashcat 10 3,413 08-20-2019, 03:54 PM
    Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption

If you know it's just numbers and of no other details a mask attack is probably the best you can do. The "approaching final keyspace" notice is not of particular importance.
undeath hashcat 10 3,413 08-21-2019, 08:07 PM
    Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption

What mask are you running? Are you using increment? iTunes uses very slow hashing, but I don't know how many iterations are usually used. Try adding -O -w3
undeath hashcat 10 3,413 08-21-2019, 09:43 PM
    Thread: Itunes iOS 12.2 backup password encryption
Post: RE: Itunes iOS 12.2 backup password encryption

With --increment and no lower limit you will see poor performance for short mask lengths. You can try -S in that case.
undeath hashcat 10 3,413 08-21-2019, 10:53 PM
    Thread: Custom Hash Algorithm / Modify or Add new mode
Post: RE: Custom Hash Algorithm / Modify or Add new mode

No, those were manually re-hashed.
undeath hashcat 3 2,091 08-22-2019, 04:13 PM
    Thread: Need help with building mask
Post: RE: Need help with building mask

You're not going to be happy trying to BF >= 8 characters full ascii charset. Try dict+rules if you haven't.
undeath hashcat 6 2,304 08-22-2019, 04:19 PM