Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Axcrypt support
Post: RE: Axcrypt support

You can't run program code through an online translator…
undeath hashcat 28 15,225 07-22-2018, 07:48 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

use python but download the python script straight from github
undeath hashcat 28 15,225 07-24-2018, 08:41 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

Of course those numbers are not always identical. Otherwise there'd be no reason to include them in the hash string. There should not be any spaces anywhere.
undeath hashcat 28 15,225 07-26-2018, 02:26 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

your order of commands is wrong. First hash file, then mask/wordlist.
undeath hashcat 28 15,225 07-27-2018, 04:50 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

you have garbage characters at the beginning of the hash file. See the first two characters. Probably a BOM. If you use a proper text editor you can disable the BOM.
undeath hashcat 28 15,225 07-29-2018, 07:47 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

laulaf Wrote: (07-31-2018, 05:46 PM) -- Have you got some an exemple of software proper text editor ? -- Notepad++ (https://notepad-plus-plus.org/)
undeath hashcat 28 15,225 07-31-2018, 07:24 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

ANSI is alright, always use it for hash lists. UTF-8 only works when your text editor does not write a BOM (or has a way to disable it). Your attack looks alright now.
undeath hashcat 28 15,225 08-02-2018, 04:27 PM
    Thread: Axcrypt support
Post: RE: Axcrypt support

axcrypt is a highly iterated, thus slow, hash. Even for very fast hashes, brute-forcing more than 8 characters is hardly feasible. Brute-force is the last resort if you have no other options.
undeath hashcat 28 15,225 08-03-2018, 11:38 AM
    Thread: axcrypt
Post: RE: axcrypt

no There was an error posting your reply: The message is too short. Please enter a message longer than 5 characters.
undeath Old oclHashcat Support 3 6,662 07-30-2015, 05:11 PM
    Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs

I don't know what made you think developer GPUs are superior for hashcracking. They aren't.
undeath Hardware 6 1,401 06-26-2020, 03:59 PM
    Thread: AWS and speed of thier GPUs
Post: RE: AWS and speed of thier GPUs

Hashcat requires good integer performance. Developer cards usually only boost floating point performance, sometimes even at the cost of integer performance. Consumer GPUs are what work best for hashca...
undeath Hardware 6 1,401 06-26-2020, 11:01 PM
    Thread: automatic password rule analysis and generation
Post: RE: automatic password rule analysis and generatio...

wow, that's a very cool article. Thanks for linking!
undeath User Contributions 1 7,015 02-14-2013, 01:40 AM
    Thread: ATTENTION! OpenCL kernel self-test failed.
Post: RE: ATTENTION! OpenCL kernel self-test failed.

There's a problem with the 5.1.0 version and AMD cards. This problem is fixed in the beta version.
undeath hashcat 31 12,819 08-28-2019, 10:14 AM
    Thread: Attack PMKID 16800 is slow
Post: RE: Attack PMKID 16800 is slow

That's what you can expect from mid range mobile hardware. Especially the md5/wpa ratio is absolutely normal.
undeath hashcat 2 4,479 08-12-2018, 01:14 PM
    Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.

What is your full command line? How do you determine hashcat only using one device?
undeath hashcat 6 1,682 03-09-2020, 06:18 PM
    Thread: Attack mode 6 only uses 1 GPU.
Post: RE: Attack mode 6 only uses 1 GPU.

You're not providing enough work to hashcat. Hashcat's performance highly depends on the left part of the attack. In a6 that means the wordlist. As a workaround you can either pipe in the words: Cod...
undeath hashcat 6 1,682 03-09-2020, 09:03 PM
    Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...

https://hashcat.net/faq/morework
undeath hashcat 9 3,546 02-11-2019, 11:30 AM
    Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...

I'm not implying anything, it's explained right in that FAQ article. Your mask is too small to be a useful amplifier for a very fast hash type like NTLM.
undeath hashcat 9 3,546 02-11-2019, 01:48 PM
    Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...

The left side of an attack has a higher impact on the performance than the right side. Since your left side for a7 only has 95 items you get worse performance than with the huge wordlist on a6. This i...
undeath hashcat 9 3,546 02-11-2019, 02:45 PM
    Thread: Attack mode 6 and 7 give vastly different speeds
Post: RE: Attack mode 6 and 7 give vastly different spee...

edit: ninja'd Yes, the speed difference is because that's just how hashcat works and for fast hashes there is no good workaround. You may be able to achieve slightly better speed by using a0 with rul...
undeath hashcat 9 3,546 02-11-2019, 03:12 PM