Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Axcrypt support
Post: RE: Axcrypt support

laulaf Wrote: (07-31-2018, 05:46 PM) -- Have you got some an exemple of software proper text editor ? -- Notepad++ (https://notepad-plus-plus.org/)
undeath hashcat 28 15,225 07-31-2018, 07:24 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

ANSI is alright, always use it for hash lists. UTF-8 only works when your text editor does not write a BOM (or has a way to disable it). Your attack looks alright now.
undeath hashcat 28 15,225 08-02-2018, 04:27 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

axcrypt is a highly iterated, thus slow, hash. Even for very fast hashes, brute-forcing more than 8 characters is hardly feasible. Brute-force is the last resort if you have no other options.
undeath hashcat 28 15,225 08-03-2018, 11:38 AM
    Thread: backslash(\) slow down md5 speed
Post: RE: backslash(\) slow down md5 speed

Static prefixes in a mask attack slow down the attack, that's a known limitation in hashcat. Avoid static prefixes if possible and try to change your attack.
undeath General Talk 2 2,315 11-11-2018, 02:21 AM
    Thread: Base password permutations
Post: RE: Base password permutations

generate rule files with rules for what you want to do
undeath General Talk 2 2,148 09-17-2018, 11:23 PM
    Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw

It's a bunch of base64-encoded binary data but that's really all you can say. What makes you think it's hashes at all?
undeath hashcat 6 5,009 05-21-2018, 08:39 PM
    Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw

Wouldn't some kind of encryption be much more likely, given that it seems to store some kind of extractable information?
undeath hashcat 6 5,009 05-21-2018, 11:33 PM
    Thread: basic question hardware build
Post: RE: basic question hardware build

unless you need cpu cracking the cpu isn't important at all. 2gb of ram are also sufficient. All that matters is vram. You don't need a fast harddisk either. Even PCIe x1 would be enough per card. If ...
undeath Hardware 2 5,765 01-27-2014, 04:37 PM
    Thread: Basic Questions - Hashs
Post: RE: Basic Questions - Hashs

You are very inpatient. Also this forum is about cracking hashes, not acquiring some.
undeath General Help 5 9,892 10-18-2012, 09:52 PM
    Thread: bcript+salt?
Post: RE: bcript+salt?

i don't know what Y is, but bcrypt has its native salt encoded in the hash string. If you have an additional salt that is non-standard and you have to do non-standard things.
undeath hashcat 8 5,600 07-12-2018, 06:54 PM
    Thread: bcript+salt?
Post: RE: bcript+salt?

What command are you running to crack the example hash and what output do you receive?
undeath hashcat 8 5,600 07-15-2018, 05:45 PM
    Thread: bcript+salt?
Post: RE: bcript+salt?

Don't install the sdk, only install the normal driver.
undeath hashcat 8 5,600 07-16-2018, 03:53 PM
    Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash

is anything unclear about this warning? Code: -- * Device #2: Skipping unstable hash-mode 3200 for this device. You can use --force to override, but do not report related errors. --
undeath hashcat 5 5,601 02-27-2018, 06:36 PM
    Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash

ok, I'll translate the message for you: Quote: -- hash mode 3200 is known to be broken on this device. I'm refusing to run it. If you still want to run this hash mode on your broken device you can d...
undeath hashcat 5 5,601 02-27-2018, 06:53 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

https://hashcat.net/forum/thread-7686.html?highlight=stdin
undeath hashcat 12 18,675 11-21-2018, 11:43 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

brute-forcing bcrypt is not feasible.
undeath hashcat 12 18,675 11-22-2018, 05:36 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible.
undeath hashcat 12 18,675 11-22-2018, 06:14 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Mem5 Wrote: (11-23-2018, 12:14 AM) -- Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds. -- With cost factor 12? I think you're being a little too optimistic :D
undeath hashcat 12 18,675 11-23-2018, 04:50 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel.
undeath hashcat 12 18,675 11-28-2018, 02:41 PM
    Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix

if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4
undeath General Talk 2 2,127 09-27-2018, 04:14 PM