Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

First, you need -r for every rule file you specify. However, the error you got seems like a opencl problem. is hashcat generally working?
undeath hashcat 9 5,668 06-26-2018, 07:53 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

mask attack/brute force should be your last resort, especially when you suspect the password is actually using a real word. Also that mask with --increment is going to try lots of invalid candidates.
undeath hashcat 9 5,668 06-27-2018, 05:12 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

regarding your opencl problem, I have no idea what exactly is wrong but I highly suspect something with your driver is kaput.
undeath hashcat 9 5,668 06-27-2018, 05:54 PM
    Thread: Rule syntax question
Post: RE: Rule syntax question

no .
undeath General Help 9 12,636 02-20-2015, 11:25 PM
    Thread: Rule syntax question
Post: RE: Rule syntax question

rules only work on single characters (well, actually bytes), not character sequences. Rules are not delimited by whitespace. Whitespace is just for making them look nicer.
undeath General Help 9 12,636 02-23-2015, 04:21 PM
    Thread: Rule Question
Post: RE: Rule Question

hashcat will not run the unmodified word unless a rule in the rules file returns the unmodified word again.
undeath hashcat 3 1,245 08-26-2019, 04:05 PM
    Thread: Rule Piping Request
Post: RE: Rule Piping Request

how about using oclHashcat with -j option?
undeath Feature Requests 20 45,531 11-17-2011, 09:46 PM
    Thread: Rule Piping Request
Post: RE: Rule Piping Request

the problem is not generating the rules at all but storing them.
undeath Feature Requests 20 45,531 11-18-2011, 02:15 PM
    Thread: Rule new
Post: RE: Rule new

You don't want a rule, you want a mask matching a policy. Use PACK https://thesprawl.org/projects/pack/
undeath User Contributions 3 7,866 04-14-2015, 11:07 PM
    Thread: Rule insert
Post: RE: Rule insert

you need to write a custom rule file for your case.
undeath General Talk 4 2,550 03-24-2019, 11:00 PM
    Thread: Rule insert
Post: RE: Rule insert

Use the i rule. All rules are equally fast for all intents and purposes.
undeath General Talk 4 2,550 03-25-2019, 11:09 AM
    Thread: Rule help
Post: RE: Rule help

All rules marked with "+" in the notes do not work in newer versions. They only work in the legacy cpu version.
undeath hashcat 5 4,934 05-14-2017, 03:11 PM
    Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...

royce Wrote: (04-22-2018, 07:51 PM) -- even if you could cut the time in half (which would be much better than the keyspace reduction you're trying to do), will take a very very long time to run. -- ...
undeath hashcat 6 4,323 04-22-2018, 08:25 PM
    Thread: Rtx 2080 max-q
Post: RE: Rtx 2080 max-q

Laptops are generally not recommended for use with hashcat. They are not designed to handle sustained high loads and will overheat and/or heat throttle quickly, damaging your hardware in the long run....
undeath Hardware 5 2,768 08-19-2019, 11:23 AM
    Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes

What is "rfc2898DeriveBytes" supposed to be? RFC2898 (https://tools.ietf.org/html/rfc2898) specifies mulitple KDFs, one of them being the supported PBKDF2 algorithm. But anyway, all the algorithms ...
undeath hashcat 4 2,994 10-01-2018, 11:51 AM
    Thread: rfc2898DeriveBytes
Post: RE: rfc2898DeriveBytes

check out https://hashcat.net/wiki/doku.php?id=example_hashes modes 10900 11900 12000 12100
undeath hashcat 4 2,994 10-01-2018, 01:38 PM
    Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM

@ktinoulas: you are talking about an early-reject in the 5500 kernel. Looks like this is already implemented: https://github.com/hashcat/hashcat/blob/f6cfcbbc3a37e9b0ef9448f7d70f9013b65bd027/OpenCL/m0...
undeath User Contributions 18 36,655 05-07-2018, 05:13 PM
    Thread: Reverse pass and hash on oclHashcat-plus
Post: RE: Reverse pass and hash on oclHashcat-plus

i don't think this is something to be handled by the hashcat engine. Reversing a hash itself can be sone by a simple shell command. Reversing the word can be done by using the "r" rule. With the up...
undeath Feature Requests 2 7,535 12-20-2011, 12:10 AM
    Thread: Return Code backwards
Post: RE: Return Code backwards

However it's inconsistent because 0 actually indicates a "successful" run (posix standard).
undeath Very old oclHashcat-lite Support 3 9,111 11-03-2012, 11:59 AM
    Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...

32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7). All other security properties are trivially fulfilled under...
undeath hashcat 2 2,089 11-20-2018, 01:48 AM