Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Does not start Hashcat
Post: RE: Does not start Hashcat

No errors, just warnings. To fix get a new GPU.
undeath hashcat 1 1,932 11-12-2017, 10:45 PM
    Thread: Domain Cached Credentials 2
Post: RE: Domain Cached Credentials 2

Windows 7 offlinely stores passwords with NTLM, are you sure it is DCC2? See example hashes here: https://hashcat.net/wiki/doku.php?id=example_hashes
undeath Old oclHashcat Support 5 17,250 04-05-2014, 11:16 AM
    Thread: Don't work Sha-1(base-64)
Post: RE: Don't work Sha-1(base-64)

these are not exactly SHA1 hashes but base64(hex(sha1($pass))) ones. You need to base64-decode the hashes before you can crack them.
undeath Old hashcat Support 6 12,366 01-18-2012, 10:03 PM
    Thread: Done my research, now I need a review. 20 GPU cracking cluster.
Post: RE: Done my research, now I need a review. 20 GPU...

you can get a preconfigured system at https://sagitta.pw/
undeath Hardware 27 43,078 02-04-2016, 12:05 PM
    Thread: double md5 not working
Post: RE: double md5 not working

damn, forgot to upgrade my drivers :/ Thank you.
undeath Very old oclHashcat-plus Support 2 6,111 09-18-2012, 09:26 PM
    Thread: Double Salted Hash - SHA1 and SHA256
Post: RE: Double Salted Hash - SHA1 and SHA256

this format is unsupported.
undeath Old hashcat Support 1 6,325 12-05-2012, 12:46 AM
    Thread: Double SHA1
Post: RE: Double SHA1

You could either code a custom hash mode for this or write a converter that generates all possible hashes from the concatenated numbers you have.
undeath Old oclHashcat Support 9 13,637 06-20-2016, 05:40 PM
    Thread: drivers
Post: RE: drivers

there are plans, but unless AMD fixes their crappy drivers this will not happen.
undeath Very old oclHashcat-plus Support 2 5,113 12-19-2012, 10:47 AM
    Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack

Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4.
undeath Beta Tester 11 10,338 08-13-2012, 10:50 AM
    Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack

oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e...
undeath Beta Tester 11 10,338 08-13-2012, 10:53 AM
    Thread: DS2432 brute force
Post: RE: DS2432 brute force

a sha1 hash consists of 20 bytes so whatever you have there does not seem to be a sha1 hash at all. Actually I have never heard of a hash consisting of 8 bytes. (if your salt consists of 56 bytes it d...
undeath Very old oclHashcat-lite Support 5 12,415 12-08-2011, 03:43 AM
    Thread: DS2432 brute force
Post: RE: DS2432 brute force

as long as you expect the password to only consist of valid ascii characters with no specials or control characters the password should be bruteforced within some days using a recent gpu. But if you e...
undeath Very old oclHashcat-lite Support 5 12,415 12-08-2011, 04:14 AM
    Thread: Dusted off old gaming laptop
Post: RE: Dusted off old gaming laptop

Your device is too old.
undeath General Talk 3 980 04-27-2020, 10:26 PM
    Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing

Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical pr...
undeath General Talk 4 4,982 09-10-2017, 06:08 PM
    Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing

According to this paper (https://dl.acm.org/citation.cfm?id=2011531) it would require 1000 qubits to break ECC-160. As I said in my previous post, hashing algorithms are usually not vulnerable to q...
undeath General Talk 4 4,982 09-11-2017, 04:12 PM
    Thread: Effects of unequal RAM and VRAM in rig
Post: RE: Effects of unequal RAM and VRAM in rig

Not enough RAM leads to CL_OUT_OF_HOST_MEMORY errors. It won't slow down things. MD5/NTLM should be good candidates for stability testing, although there might be even better ones.
undeath Hardware 1 1,960 09-25-2018, 02:23 PM
    Thread: Efficiency Question - Wordlists or rules-on-the-fly
Post: RE: Efficiency Question - Wordlists or rules-on-th...

For slow hashes it does not really matter but for fast hashes piping is slower because everything needs to be transferred from CPU to GPU.
undeath General Talk 1 3,518 02-03-2016, 09:48 PM
    Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?

if you only need to store user passwords, store a base64 encoded string of the hash.
undeath General Talk 5 15,747 08-07-2012, 07:45 PM
    Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...

Posting hashes is against the rules. However, hash loads without problems for me. What's your command line?
undeath Beta Tester 4 1,400 03-09-2020, 01:29 AM
    Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...

Code: -- hashcat -h | grep -i electrum 16600 | Electrum Wallet (Salt-Type 1-3) | Password Managers 21700 | Electrum Wallet (Salt-Type 4) | Password Ma...
undeath Beta Tester 4 1,400 03-09-2020, 01:54 AM