Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Save mask in wordlist
Post: RE: Save mask in wordlist

hashcat -a3 PAS?dWOR?d --stdout > list.txt
undeath General Talk 1 929 01-03-2020, 10:41 PM
    Thread: save md5 generated hashes to the file ?
Post: RE: save md5 generated hashes to the file ?

No. If you want to waste your space with rainbow tables go to freerainbowtables.com.
undeath Old oclHashcat Support 2 5,359 12-26-2014, 12:29 PM
    Thread: Save progress every x seconds-hashcat-cli64.exe
Post: RE: Save progress every x seconds-hashcat-cli64.ex...

when you kill hashcat it will tell you which -s value you need to use to resume the attack.
undeath Old hashcat Support 5 12,586 10-19-2014, 06:33 PM
    Thread: Saving calculated hashes
Post: RE: Saving calculated hashes

you'd have to code that yourself.
undeath General Talk 8 16,790 05-19-2013, 04:36 PM
    Thread: Scheduled checkpoint
Post: RE: Scheduled checkpoint

Hashcat will automatically update the restore file as soon as a checkpoint is reached. If you do not want to lose any progress and have some control over the shutdown process you can monitor the resto...
undeath hashcat 3 1,669 06-18-2019, 05:23 PM
    Thread: Script or tool for hashing lines needed
Post: RE: Script or tool for hashing lines needed

run them with --help
undeath General Talk 4 1,596 09-25-2019, 09:31 PM
    Thread: Scrypt and TMTO question
Post: RE: Scrypt and TMTO question

Do you even know what TMTO means? It has nothing to do with n, p, r values. (what is r?)
undeath Old oclHashcat Support 7 12,640 06-23-2015, 07:56 PM
    Thread: Scrypt and TMTO question
Post: RE: Scrypt and TMTO question

mrleau Wrote: (06-24-2015, 03:04 AM) -- Please correct me if I'm wrong but it's Time Memory TradeOff and from my limited understanding is used to control Execution time and/or memory usage of the sc...
undeath Old oclHashcat Support 7 12,640 06-24-2015, 06:58 PM
    Thread: scrypt hash format
Post: RE: scrypt hash format

You have to reformat the hashes for cracking with hascat. Hashcat's format is SCRYPT:n:r:p:salt:hash salt and hash are base64-encoded. I think hashcat only supports hash lengths of 32 bytes. You have...
undeath hashcat 2 1,189 08-12-2019, 11:19 AM
    Thread: Searching very big word list
Post: RE: Searching very big word list

use the maskprocessor to generate your new favourite 50gb+ wordlist and suffer.
undeath General Help 4 8,654 05-23-2013, 04:25 PM
    Thread: See output of oclhashcat
Post: RE: See output of oclhashcat

There is not. This is not really possible since the program is heavily multithreaded.
undeath Old oclHashcat Support 3 5,570 03-19-2015, 12:50 AM
    Thread: segfault on --stdout
Post: RE: segfault on --stdout

gshumway Wrote: (09-30-2018, 08:35 PM) -- So for -m 2500, 1234567 would get rejected, and so would every variation created by the rule, regardless of correct length.  Do I have this right? -- That's...
undeath hashcat 4 3,011 10-01-2018, 12:20 AM
    Thread: segfault on --stdout
Post: RE: segfault on --stdout

Your syntax is correct. The only thing I can imagine is some incompatibility with debian testing and the binary build of hashcat. You can try compiling hashcat yourself or see if stdout works correctl...
undeath hashcat 4 3,011 10-01-2018, 11:56 AM
    Thread: Segmentation fault (core dump) on --show and --left
Post: RE: Segmentation fault (core dump) on --show and -...

can reproduce Code: -- [ undeath@2600k: /tmp ] % ~> for i in `seq 20` ; do PW=`date "+%s%N%n%:::z%T" | md5sum | xxd -r -ps | base64 | cut -c1-13` ; echo "$PW" >> /tmp/plain ; echo -n "${PW}:" >> /...
undeath Very old oclHashcat-plus Support 11 24,118 10-14-2012, 01:34 PM
    Thread: Segmentation fault [core dumped] by any execution.
Post: RE: Segmentation fault [core dumped] by any execut...

Remove pocl and try again.
undeath hashcat 7 593 08-25-2020, 05:05 PM
    Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)

hashcat doesn't support that but I think maskprocessor has an option.
undeath User Contributions 5 5,221 04-16-2018, 02:27 PM
    Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)

you can pipe the maskprocessor output to hashcat. no need to save anything to disk.
undeath User Contributions 5 5,221 04-16-2018, 04:29 PM
    Thread: sense word mask attack (hashcat WPA/2)
Post: RE: sense word mask attack (hashcat WPA/2)

Code: -- mp64 [options] | hashcat -a0 [options] --
undeath User Contributions 5 5,221 04-17-2018, 11:44 AM
    Thread: separator unmatched
Post: RE: separator unmatched

Hard to say without knowing your command line but I suspect you switched the parameters for wordlist and hashlist.
undeath hashcat 7 1,480 05-08-2020, 05:09 PM
    Thread: separator unmatched
Post: RE: separator unmatched

never use --force. if there are problems with hashcat fix them. I have no idea what kind of hash you are trying to crack but two things seem obvious: 1. you need to use the correct hash mode for w...
undeath hashcat 7 1,480 05-08-2020, 05:32 PM