Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

hashcat runs on any device supporting opencl, which includes modern CPUs and GPUs. You just need to install the correct opencl runtime for the device. If you want others to help you with cracking y...
undeath hashcat 21 17,277 02-10-2018, 11:20 PM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

Go to https://hashcat.net/wiki/doku.php?id=example_hashes and search for "chap". Should clear up your questions. I also recommend taking a look at the output of hashcat --help
undeath hashcat 21 17,277 02-12-2018, 12:48 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

yes, the challenge is required in order to crack the hash.
undeath hashcat 21 17,277 02-12-2018, 01:01 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

I don't know how the CHAP handshake works but I would expect you can still crack a hash with a wrong password. The challenge should still be transmitted. Unless it was coincidence the ID at the end...
undeath hashcat 21 17,277 02-12-2018, 01:13 AM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

trial and error + educated guessing
undeath hashcat 21 17,277 02-12-2018, 02:49 PM
    Thread: Cracking a CHAP from Freeradius
Post: RE: Cracking a CHAP from Freeradius

There is no easy and quick generic way to learn things like this. It's knowledge you amass over months and years by reading, observation and experience, combined with a fair amount of common sense. ...
undeath hashcat 21 17,277 02-13-2018, 01:36 PM
    Thread: cracking a domain cachedump
Post: RE: cracking a domain cachedump

slawson Wrote: (11-08-2014, 04:44 AM) -- If I have a hash from a Domain Credentials cache dump, can I crack it by using either hash type 1000 or 1100? My testing shows that cracking via type 1100 is...
undeath Old oclHashcat Support 6 16,230 11-08-2014, 02:38 PM
    Thread: Cracking a SHA-256 hash
Post: RE: Cracking a SHA-256 hash

1. how to crack? A: https://hashcat.net/wiki/ 2. is SHA-256 a safe PSA? A: No. 2.b What is better? A: (pbkdf2), bcrypt, scrypt, argon2 (weak -> strong) 3. Does that matter for a password with 36^64 po...
undeath General Help 1 25,921 05-28-2016, 07:25 PM
    Thread: Cracking bcrypt hash using brute force mode
Post: RE: Cracking bcrypt hash using brute force mode

Pure masks don't support this but you can create a hcmask file with policygen from PACK: https://github.com/iphelix/PACK
undeath hashcat 7 1,538 05-11-2020, 01:04 AM
    Thread: Cracking ethereum wallet password
Post: RE: Cracking ethereum wallet password

first, do not post hashes. second, you are not specifying an attack mode and corresponding settings, hence hashcat defaults to stdin mode with a0.
undeath hashcat 3 5,572 12-20-2017, 03:56 PM
    Thread: Cracking ethereum wallet password
Post: RE: Cracking ethereum wallet password

If you don't specify a mask hashcat will use a default one which is probably not what you want. Anyway, cracking such a wallet with bf is near impossible unless the password is very short (and you kno...
undeath hashcat 3 5,572 12-20-2017, 04:36 PM
    Thread: Cracking failed on Radeon Pro WX5100
Post: RE: Cracking failed on Radeon Pro WX5100

please post the full hashcat output of a cracking attempt.
undeath hashcat 5 6,864 05-09-2017, 02:30 PM
    Thread: cracking hashs how to ignore user name??
Post: RE: cracking hashs how to ignore user name??

you have to format it myusername:hash:salt and use the --username switch.
undeath Old hashcat Support 4 9,905 04-22-2012, 02:13 PM
    Thread: cracking hashs how to ignore user name??
Post: RE: cracking hashs how to ignore user name??

you format it like myusername:hash:salt and start hashcat with the --username switch
undeath Old hashcat Support 4 9,905 04-22-2012, 02:29 PM
    Thread: Cracking in Google Cloud Instance Questions.
Post: RE: Cracking in Google Cloud Instance Questions.

Code: -- [email protected]:~/hashcat-4.2.1$ clinfo Number of platforms 0 -- well, there's your problem. opencl runtime isn't installed or working.
undeath Hardware 17 14,865 09-26-2018, 11:52 PM
    Thread: Cracking LM
Post: RE: Cracking LM

what driver do you have installed? might be connected to this? https://hashcat.net/forum/thread-1173.html
undeath Very old oclHashcat-plus Support 8 33,383 05-28-2012, 06:24 PM
    Thread: Cracking Russian Passwords
Post: RE: Cracking Russian Passwords

yep, your plain is wrong. echo -n 'ьфдщн' | md5sum 507620db658a3d55c367cc8273e2ee24 -
undeath Very old oclHashcat-plus Support 11 23,632 05-24-2012, 12:57 AM
    Thread: Cracking salted md5
Post: RE: Cracking salted md5

format is hash:salt how the salt looks like doesn't matter
undeath Old oclHashcat Support 2 21,215 05-11-2014, 10:58 PM
    Thread: cracking salted SHA1
Post: RE: cracking salted SHA1

format is hash:salt, hash in hex format, salt in binary (if you have non-ascii characters specify the salt in hex and use --hex-salt) Your hash file has a BOM, you need to remove that.
undeath hashcat 14 19,731 06-28-2018, 04:08 PM
    Thread: cracking salted SHA1
Post: RE: cracking salted SHA1

It's possible your salt is longer than the maximum hashcat expects. How long is it? If your hex-encoded salt is indeed five characters long something is wrong.
undeath hashcat 14 19,731 06-28-2018, 05:35 PM