Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Smart Brutforce?
Post: RE: Smart Brutforce?

You can use PACK (https://github.com/iphelix/PACK) to match a specific password policy or play around with hashcat's mask attack and the -t argument. Unfortunately with -t it's not possible to later r...
undeath hashcat 1 1,102 07-04-2019, 04:27 PM
    Thread: SMF
Post: RE: SMF

121 is the hash mode for smf. you need the hash and the username.
undeath General Help 3 9,425 05-10-2014, 09:55 PM
    Thread: SMF
Post: RE: SMF

Manmaniac Wrote: (05-10-2014, 10:45 PM) -- hash:username --
undeath General Help 3 9,425 05-10-2014, 11:04 PM
    Thread: Snowden Files Cracked, Surprised?
Post: RE: Snowden Files Cracked, Surprised?

Just some numbers: Cracking AES-128 at a speed of 10^18 tries per second (which is probably much faster than even the NSA can afford) takes an awful lot of time: 2**128/1000000000000000000/60/60/24/...
undeath General Talk 4 8,059 06-14-2015, 02:35 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

Yes, you want to do a mask attack https://hashcat.net/wiki/doku.php?id=mask_attack
undeath hashcat 25 21,257 08-08-2017, 11:43 AM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

slayerdiangelo Wrote: (08-08-2017, 03:21 PM) -- You should use the mask processor and pipe the output to Hashcat. -- Hashcat supports mask attacks in attack mode 3. No need to use external tools. ...
undeath hashcat 25 21,257 08-08-2017, 04:20 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

depends, if your wallet is mode 15600 [$ethereum$p] use your GPU (mining rig) if your wallet is mode 15700 [$ethereum$s] use your CPU (gaming machine) still use your mining rig (well, actually it mig...
undeath hashcat 25 21,257 08-08-2017, 06:42 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

use https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/ethereum2john.py to extract the necessary info from your wallet you're on the right track. To set the hash type consult --h...
undeath hashcat 25 21,257 08-09-2017, 12:00 AM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

4 H/s is really slow. Something seems off. As written before, my old 2600k manages to get 13 H/s. But why not using your GPU? It's probably still at least as fast as your CPU. Note that it may take ~2...
undeath hashcat 25 21,257 08-09-2017, 10:18 AM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

Did you try --scrypt-tmto=0? At least the example hash works for me with every tmto setting (though 0 is the fastest option on cpu and gpu in my scenario). --force is only if you use an unsupported...
undeath hashcat 25 21,257 08-09-2017, 05:38 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

I just learnt script-tmto=0 means auto-configuration, not disable tmto trade-offs alltogether. And furthermore, the higher the value the less RAM is used. However, there might be an incompatibility w...
undeath hashcat 25 21,257 08-10-2017, 04:55 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

take home message: the scrypt settings ethereum uses by default make GPU cracking mostly impossible. Just use your CPU.
undeath hashcat 25 21,257 08-10-2017, 05:35 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

scrypt has three parameters. Depending on how those parameters are chosen it may or may not work on GPU. The parameters of your ethereum wallet don't.
undeath hashcat 25 21,257 08-11-2017, 10:12 AM
    Thread: Software Encrypted Files
Post: RE: Software Encrypted Files

I don't know how exactly this update is supposed to be installed, but somewhere the encryption key must be supplied, if the file is encrypted at all. Since it's apparently not you that supplies the e...
undeath General Talk 2 2,218 09-02-2018, 11:28 AM
    Thread: some hardware questions for building a new rig
Post: RE: some hardware questions for building a new rig

The software shipped with Brutalis, Hashstack, has some limitations which is why it's still using 14.04. (a new version is already available internally afaik) There is no good reason to use such an o...
undeath Hardware 4 4,548 08-31-2017, 03:58 PM
    Thread: some info about rules
Post: RE: some info about rules

https://hashcat.net/wiki/doku.php?id=rule_based_attack
undeath hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 1,274 09-07-2019, 12:07 PM
    Thread: Some interesting test 14100
Post: RE: Some interesting test 14100

You cannot do something like k1=k3 with a mask.
undeath hashcat 5 1,319 04-28-2020, 02:19 AM
    Thread: Some problems, first exhausted now cant find my card
Post: RE: Some problems, first exhausted now cant find m...

If your WLAN password has more than 15 characters you cannot crack it using oclhashcat. It only supports plains up to 15 charaters. (maybe this answers your first question). With the problem after ...
undeath Very old oclHashcat-plus Support 3 8,867 03-24-2012, 04:43 PM
    Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'

You can use princeprocessor for this. It can handle everything but the space between the words. Toggling the case of the first character can be done with a hashcat rule.
undeath hashcat 6 2,052 08-30-2019, 09:36 PM
    Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'

Yes, you could simply append a space to every word in your wordlist for that case. Just remember to add a rule in hashcat that deletes the trailing space of the last word.
undeath hashcat 6 2,052 08-30-2019, 09:43 PM