Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Yet another "No hashes loaded"
Post: RE: Yet another "No hashes loaded"

are you using the correct mode?
undeath Old oclHashcat Support 3 10,195 05-25-2015, 01:54 AM
    Thread: XNMI rule function is not working ?
Post: RE: XNMI rule function is not working ?

rules annotated with "+" on the rules wiki page (https://hashcat.net/wiki/doku.php?id=rule_based_attack) only work with the legacy hashcat-cpu version.
undeath hashcat 3 1,193 09-27-2019, 04:42 PM
    Thread: Wrong Time Estimated with -w 4 parameter
Post: RE: Wrong Time Estimated with -w 4 parameter

There can be lots of reasons for this. Some other program may have used the GPU within those four hours, leading to a temporary speed drop. Or maybe thermal throttling kicked in, slowing the cards dow...
undeath hashcat 4 2,730 09-04-2018, 04:20 PM
    Thread: WPA2 Enterprise ?
Post: RE: WPA2 Enterprise ?

WPA Enterprise uses IEEE 802.1X. Most widespread implementations are based on TLS.
undeath General Help 3 7,123 06-22-2014, 12:44 PM
    Thread: WPA2 crack rules
Post: RE: WPA2 crack rules

That's quite tricky. *hashcat has no functionality to archive this. You can try to use https://www.thesprawl.org/projects/pack/ to generate some mask files or try creating a specific wordlist for this...
undeath Old oclHashcat Support 6 9,333 10-13-2015, 12:46 PM
    Thread: WPA2 Bruteforce.
Post: RE: WPA2 Bruteforce.

If you need to match such password policies you will need to use PACK https://thesprawl.org/projects/pack/
undeath Old oclHashcat Support 2 6,379 07-17-2015, 03:01 PM
    Thread: WPA/WPA2: Making it feasable?
Post: RE: WPA/WPA2: Making it feasable?

if it is truly random no.
undeath General Help 2 5,556 05-06-2014, 10:35 PM
    Thread: WPA/WPA2 which hashcat, which rules ?
Post: RE: WPA/WPA2 which hashcat, which rules ?

if you want to crack WPA on cpu you have to use aircrack.
undeath Very old oclHashcat-plus Support 9 23,914 01-10-2013, 04:41 PM
    Thread: WPA/WPA2 using PMK 2501
Post: RE: WPA/WPA2 using PMK 2501

Please don't hijack unrelated threads. And why don't you try to run the commands instead of asking if you can?
undeath hashcat 3 3,234 08-06-2018, 10:12 PM
    Thread: WPA/WPA2 in hashcat
Post: RE: WPA/WPA2 in hashcat

isn't aircrack good enough for such easy tasks? I think it accepts stdin wordlists, so this is easy to deal with in combination with maskprocessor.
undeath Feature Requests 13 32,539 01-10-2013, 04:45 PM
    Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...

current version is 4.1.0 https://github.com/hashcat/hashcat/releases/download/v4.1.0/hashcat-4.1.0.7z
undeath hashcat 9 6,762 02-22-2018, 09:35 PM
    Thread: Wpa/Wpa2 dictionary attack is very slow after the latest update
Post: RE: Wpa/Wpa2 dictionary attack is very slow after ...

so, are you on version 4.1.0 yet?
undeath hashcat 9 6,762 02-22-2018, 10:13 PM
    Thread: WPA speed problem comparing to v1.31
Post: RE: WPA speed problem comparing to v1.31

Mem5 Wrote: (02-16-2015, 11:26 PM) -- OK, but the 35% rejected was because passwords length were not between 8-64 chars ; so do you mean that v1.32 can test password 64 chars ? -- No. Previous vers...
undeath Old oclHashcat Support 8 14,758 02-17-2015, 03:30 PM
    Thread: Wpa speed dropping
Post: RE: Wpa speed dropping

possibly throttling because of bad cooling
undeath General Talk 6 4,732 08-01-2018, 07:54 PM
    Thread: WPA restarting ten digit bruteforce
Post: RE: WPA restarting ten digit bruteforce

oclhashcat-plus does not have any option to resume.
undeath General Talk 3 9,677 07-26-2012, 07:31 PM
    Thread: WPA masks
Post: RE: WPA masks

For WPA the speed difference is irrelevant. Also hashcat cannot further filter the candidates generated by the mask generator.
undeath General Help 6 14,431 12-14-2012, 04:35 PM
    Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy

if hashcat can decrypt it so can anyone else.
undeath Feature Requests 8 16,481 12-09-2012, 07:24 PM
    Thread: WPA MAC Privacy
Post: RE: WPA MAC Privacy

What i was referring to is that everyone is able to reverse engineer the binary executable and figure out how the file gets decrypted. It's about the same level of security as locking your car and hid...
undeath Feature Requests 8 16,481 12-10-2012, 01:39 AM
    Thread: WPA help
Post: RE: WPA help

standard wpa(2) is mode 2500. Unless you know what PMK or PMKID means you don't need them.
undeath General Talk 1 978 12-11-2019, 01:00 AM
    Thread: WPA crack not working in Windows Environment
Post: RE: WPA crack not working in Windows Environment

actually this sounds like a bug in the windows version (compiler bug?)
undeath Old oclHashcat Support 10 25,133 10-29-2014, 09:27 PM