Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED

ok, so there are 4*36 possibilities per hash. That's perfectly doable, but you should write a small script instead of using hashcat for that. hashcat can't utilise its parallelisation well with that f...
undeath hashcat 10 3,557 12-10-2019, 11:56 PM
    Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED

I can reproduce the error you are seeing, but only after the hash has been successfully cracked, hence hashcat exits early.
undeath hashcat 10 3,557 12-16-2019, 01:00 PM
    Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED

this code is not extraordinarily fast but should give you an idea: Code: -- #!/usr/bin/env python3 from sys import argv from itertools import product if len(argv) != 2: print("usage: {} place...
undeath hashcat 10 3,557 12-11-2019, 05:28 PM
    Thread: NVAPI_GPU_NOT_POWERED
Post: RE: NVAPI_GPU_NOT_POWERED

From what I can see it the script should be able to handle that. Make sure the output word is among the printed candidates and if not we need to figure out why it isn't.
undeath hashcat 10 3,557 12-28-2019, 11:01 PM
    Thread: Truecrypt
Post: RE: Truecrypt

If your password is truely 18 chars and you don't remember anything useful about it, give up.
undeath General Talk 10 2,590 06-18-2020, 11:18 PM
    Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...

CracktainCrunch Wrote: (07-07-2020, 01:21 AM) -- It would essentially be a brute force attack but with pre-generated passwords that one would use in a dict attack I guess. -- I'm not sure what brou...
undeath General Talk 10 2,064 07-07-2020, 10:02 AM
    Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...

CracktainCrunch Wrote: (07-06-2020, 12:00 PM) -- Like taking already cracked passwords that were randomly generated and jumble them up or something like that? -- That's what rule-based attacks do (...
undeath General Talk 10 2,064 07-06-2020, 03:25 PM
    Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...

If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file. CracktainCrunch Wrote: (07-07-2020, 08:24 PM) -- I u...
undeath General Talk 10 2,064 07-08-2020, 08:29 PM
    Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?

@royce: I assume the bigger problem is with rules that are equivalent, yet do not have the same string representation, eg "sa4 sb6" and "sb6 sa4". I guess you don't want to simply combine them but ...
undeath hashcat 10 965 09-01-2020, 02:13 PM
    Thread: vBulletin MD5 without Salts
Post: RE: vBulletin MD5 without Salts

of course you could try to bruteforce a password AND a 30 character salts. It only slightly increases the work. 95^8 for the password and 95^30 for the salt. All in all 95^8+95^30. I don't think you w...
undeath Old hashcat Support 9 28,779 11-04-2011, 03:34 PM
    Thread: Please help a beginner
Post: RE: Please help a beginner

The minimum amount of time is instant, although this case is very unlikely. In general you can stick to these estimations: https://golubev.com/gpuest.htm So if you buy a rig consisting of 4x AMD...
undeath General Help 9 15,075 03-08-2012, 01:23 AM
    Thread: Please help a beginner
Post: RE: Please help a beginner

Yes, this is correct. Theoretically it is possible that the unlock code is found after less than the estimated time but practically SL3 is know to mostly max out this estimation. It is a brute force p...
undeath General Help 9 15,075 03-08-2012, 05:32 PM
    Thread: Please help a beginner
Post: RE: Please help a beginner

yes, the speed scales linear. Two cards of the same model double the speed (thus half the time).
undeath General Help 9 15,075 03-08-2012, 09:27 PM
    Thread: vBulletin Salt Length
Post: RE: vBulletin Salt Length

The problem is that both require their own module/kernel because there are different optimizations. While for vb3 hashes two rounds of md5 are sufficient, vb4 hashes needs three rounds because of the ...
undeath Feature Requests 9 22,262 03-18-2012, 03:06 PM
    Thread: hashcat-gui v0.5.1 - not work perfectly
Post: RE: hashcat-gui v0.5.1 - not work perfectly

specify custom charset 1: ?l?d?u and mask ?1?1?1?1?1?1?1?1 this will run a brutefoce with all passes of length 8. For longer passes you need to specify more ?1. But this will take very much time...
undeath Very old oclHashcat-plus Support 9 21,945 04-14-2012, 06:26 PM
    Thread: hashcat-gui v0.5.1 - not work perfectly
Post: RE: hashcat-gui v0.5.1 - not work perfectly

There are too many zeros ;) 2.400k = 2.400 * 1000 = 2.400 (the dot is not a thousand-separator) As is said before, WPA takes very much time. You _cannot_ brute-force this in your lifetime.
undeath Very old oclHashcat-plus Support 9 21,945 04-15-2012, 01:43 PM
    Thread: hashcat-gui v0.5.1 - not work perfectly
Post: RE: hashcat-gui v0.5.1 - not work perfectly

Brute forcing an upper/lower/digit pass of 10 chars will take too much time, no matter what type of hash. If you however cannot limit the password to a mask, you need to run a wordlist attack and h...
undeath Very old oclHashcat-plus Support 9 21,945 04-15-2012, 05:06 PM
    Thread: Issues with 7970 + Ubuntu
Post: RE: Issues with 7970 + Ubuntu

you have to wait for an update on plus.
undeath Hardware 9 17,551 04-30-2012, 06:44 PM
    Thread: ./oclHashcat-plus64.bin returns "Segmentation fault"
Post: RE: ./oclHashcat-plus64.bin returns "Segmentation...

try removing the sdk and reinstall the driver.
undeath Very old oclHashcat-plus Support 9 23,271 05-11-2012, 08:07 PM
    Thread: Help with md5($salt.$pass.$salt)
Post: RE: Help with md5($salt.$pass.$salt)

are you stupid?
undeath Feature Requests 9 21,096 05-16-2012, 06:50 PM