Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: Crack my BlockChain.info wallet 1 password
Post: RE: Crack my BlockChain.info wallet 1 password

simply delete the characters from the end
undeath hashcat 12 10,833 05-13-2018, 02:25 PM
    Thread: hi guys please a little help with hashcat
Post: RE: hi guys please a little help with hashcat

Quote: -- * Device #1: ATTENTION! OpenCL kernel self-test failed. -- hashcat shouldn't even start without using --force (which you are not using). Your opencl runtime is broken. Hashcat won't work pr...
undeath hashcat 12 8,236 06-28-2018, 06:37 PM
    Thread: hi guys please a little help with hashcat
Post: RE: hi guys please a little help with hashcat

1. you don't need to use --force since hashcat already runs for whatever reason 2. --force won't make your problem go away, it will just cause hashcat to run anyway (not needed because 1.) 3. your G...
undeath hashcat 12 8,236 06-28-2018, 06:48 PM
    Thread: Generating dictonary
Post: RE: Generating dictonary

at any time you can simply quit hashcat when running the command philsmd gave you and later resume the cracking by running "hashcat --restore"
undeath General Talk 12 8,565 07-25-2018, 07:37 PM
    Thread: Generating dictonary
Post: RE: Generating dictonary

you need to specify the correct hash mode
undeath General Talk 12 8,565 07-25-2018, 07:40 PM
    Thread: Generating dictonary
Post: RE: Generating dictonary

you can add -w4 but it will make your PC useless for anything that is not hashcat.
undeath General Talk 12 8,565 07-25-2018, 10:01 PM
    Thread: Generating dictonary
Post: RE: Generating dictonary

yes
undeath General Talk 12 8,565 07-25-2018, 11:00 PM
    Thread: Generating dictonary
Post: RE: Generating dictonary

Sorry, I misunderstood your question. No, you cannot simply add -w (or any other options) when using --restore.
undeath General Talk 12 8,565 07-26-2018, 12:36 AM
    Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow

your are doing something weird. Why are you using -a6 with a 7 char mask when you're trying to crack a LM hash? The plaintext cannot be longer than 7 chars. -a6 is only fast if your left side has enou...
undeath hashcat 12 6,451 10-26-2018, 03:35 PM
    Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow

see my edit above, piping (as you were already doing) is the correct approach.
undeath hashcat 12 6,451 10-26-2018, 03:58 PM
    Thread: hybrid attack Netntlm too slow
Post: RE: hybrid attack Netntlm too slow

it should have used all the possibilities. You can check that by examining the output of the first command on its own.
undeath hashcat 12 6,451 10-27-2018, 10:44 AM
    Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough

hashcat doesn't magically find the file for you on your system. Give the full path if it's not in your cwd. What does this have to do with /etc/shadow at all?
undeath hashcat 12 7,528 10-30-2018, 09:18 PM
    Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough

Don't use --force and report resulting problems on here. Fix your problems.
undeath hashcat 12 7,528 10-31-2018, 12:34 PM
    Thread: Noob trying to follow this walkthrough
Post: RE: Noob trying to follow this walkthrough

Well, remove --force and see what problems hashcat reports and fix them?!
undeath hashcat 12 7,528 10-31-2018, 10:20 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

https://hashcat.net/forum/thread-7686.html?highlight=stdin
undeath hashcat 12 18,677 11-21-2018, 11:43 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

brute-forcing bcrypt is not feasible.
undeath hashcat 12 18,677 11-22-2018, 05:36 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible.
undeath hashcat 12 18,677 11-22-2018, 06:14 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Mem5 Wrote: (11-23-2018, 12:14 AM) -- Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds. -- With cost factor 12? I think you're being a little too optimistic :D
undeath hashcat 12 18,677 11-23-2018, 04:50 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel.
undeath hashcat 12 18,677 11-28-2018, 02:41 PM
    Thread: Not finding my own set password
Post: RE: Not finding my own set password

cannot reproduce with my hardware Code: -- OpenCL Platform #1: Intel(R) Corporation ======================================== * Device #1: AMD Ryzen 5 1600 Six-Core Processor. OpenCL Platform ...
undeath hashcat 12 6,010 12-15-2018, 11:04 PM