Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: oclHashcat v2.10 performance questions?
Post: RE: oclHashcat v2.10 performance questions?

halexan Wrote: (05-03-2016, 05:49 AM) -- Is there any method to narrow the gap? -- atom Wrote: (04-27-2016, 10:43 AM) -- Basically 1) add a rule (important!) and 2) add -w 3 -- note: preferably a ru...
undeath Old oclHashcat Support 9 12,898 05-03-2016, 12:09 PM
    Thread: Double SHA1
Post: RE: Double SHA1

You could either code a custom hash mode for this or write a converter that generates all possible hashes from the concatenated numbers you have.
undeath Old oclHashcat Support 9 13,637 06-20-2016, 05:40 PM
    Thread: Candidate definition
Post: RE: Candidate definition

lets call it "visual flavour". It doesn't really mean anything for markov mask attacks.
undeath hashcat 9 13,199 06-22-2017, 10:43 AM
    Thread: hashcat v 4.0.0
Post: RE: hashcat v 4.0.0

https://hashcat.net/beta/
undeath hashcat 9 7,349 10-09-2017, 11:06 PM
    Thread: hashcat v 4.0.0
Post: RE: hashcat v 4.0.0

@Chick3nman: he's using -b and hence should be using optimized kernels already I think. My single 1060 pulls roughly 20 GH/s, so a 1070 + 1080 should be faster than 27 GH/s. Wouldn't that be about the...
undeath hashcat 9 7,349 10-10-2017, 04:46 PM
    Thread: hashcat v 4.0.0
Post: RE: hashcat v 4.0.0

Looks like -w 3 in benchmark mode for some reason also implies not using optimized kernels (which can be turned on again by specifying -O). That's a little confusing.
undeath hashcat 9 7,349 10-10-2017, 07:14 PM
    Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...

current version is 4.1.0 https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z
undeath hashcat 9 6,765 02-22-2018, 09:35 PM
    Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...

so, are you on version 4.1.0 yet?
undeath hashcat 9 6,765 02-22-2018, 10:13 PM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

What do you mean by "unknown text"? What is the technical difference to a password?
undeath hashcat 9 5,500 03-16-2018, 10:59 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

isn't that just the same as hmac-sha1(key = $pass)? edit: according to the argument order of hmac it should probably be hmac-sha1(key = $salt)
undeath hashcat 9 5,500 03-16-2018, 11:19 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

you should be able to crack this by using dfdf3c415d1513cc2664beecb8dad840b2132c28:17513529ea04fde116862d745a91afe0e7623ba6 --hex-salt -m 160
undeath hashcat 9 5,500 03-16-2018, 11:29 AM
    Thread: SHA1_HMAC for unknown text
Post: RE: SHA1_HMAC for unknown text

btw, here is a mask file for ipv4 addresses without leading zeros: https://pastebin.com/4HQ6C8gG
undeath hashcat 9 5,500 03-16-2018, 12:23 PM
    Thread: 1Password Competition
Post: RE: 1Password Competition

as you can see on https://hashcat.net/wiki/doku.php?id=example_hashes mode 10900 uses base64-encoded data, not hex
undeath General Talk 9 7,198 05-13-2018, 05:17 PM
    Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat

https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_is_it_possible_that_hashcat_does_not_utilize_all_gpus
undeath Hardware 9 6,985 05-17-2018, 03:35 PM
    Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat

I mean, you could simply read the information at the link I posted above OR you can keep posting further and wasting everyone's time.
undeath Hardware 9 6,985 05-18-2018, 11:03 AM
    Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat

so, what did you do to provide more work?
undeath Hardware 9 6,985 05-18-2018, 02:13 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

You are mixing masks and rules here. That's not possible.
undeath hashcat 9 5,668 06-25-2018, 07:03 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

First, you need -r for every rule file you specify. However, the error you got seems like a opencl problem. is hashcat generally working?
undeath hashcat 9 5,668 06-26-2018, 07:53 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

mask attack/brute force should be your last resort, especially when you suspect the password is actually using a real word. Also that mask with --increment is going to try lots of invalid candidates.
undeath hashcat 9 5,668 06-27-2018, 05:12 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

regarding your opencl problem, I have no idea what exactly is wrong but I highly suspect something with your driver is kaput.
undeath hashcat 9 5,668 06-27-2018, 05:54 PM