Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Mining Rig for hashcat
Post: RE: Mining Rig for hashcat

so, what did you do to provide more work?
undeath Hardware 9 6,985 05-18-2018, 02:13 PM
    Thread: minimum password length with mask
Post: RE: minimum password length with mask

well this looks kinda strange Code: -- Hash.Type........: WPA/WPA2 Time.Started.....: Tue Jan 02 16:44:52 2018 (21 secs) Time.Estimated...: Tue Jan 02 17:02:47 2018 (17 mins, 34 secs) Guess.Mas...
undeath hashcat 6 8,088 01-03-2018, 01:24 PM
    Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...

I'd invest in a simple calculator.
undeath Hardware 10 8,020 05-08-2018, 09:54 PM
    Thread: Minimum investment on a descent rig for 16+ character NTLM passwords
Post: RE: Minimum investment on a descent rig for 16+ ch...

yes, the password length in combination with "brute force"
undeath Hardware 10 8,020 05-08-2018, 09:59 PM
    Thread: Min/Max Password Length
Post: RE: Min/Max Password Length

liquiz Wrote: (07-24-2013, 02:14 PM) -- The plan is to bruteforce 1-8 then use oclhashcat for 8-16 and then use hashcat for 17+. -- I lol'd. What's your keyspace like? 5 characters?
undeath Old hashcat Support 3 15,782 07-24-2013, 06:29 PM
    Thread: Mildly damaged card still good for hashcat?
Post: RE: Mildly damaged card still good for hashcat?

Defective cards will cause false positives/false negatives or just outright crash, possibly after some time.
undeath Hardware 1 1,494 02-25-2019, 01:15 PM
    Thread: Microsoft Azure Ubuntu. Problem with hashcat
Post: RE: Microsoft Azure Ubuntu. Problem with hashcat

When disconnecting ssh all programs running in the shell will usually be terminated. If you want a program to continue running you need to use a terminal emulator like screen or tmux or other techniqu...
undeath hashcat 12 1,185 08-16-2020, 12:46 PM
    Thread: Meltdown and Spectre patches
Post: RE: Meltdown and Spectre patches

using the search function is hard. https://hashcat.net/forum/thread-7710.html?highlight=spectre
undeath General Talk 1 662 05-10-2020, 01:59 AM
    Thread: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD5 support for lite
Post: RE: md5crypt, MD5(Unix), FreeBSD MD5, Cisco-IOS MD...

i think this question was already asked and atom said these types of hashes are incompatible with the *-lite framework.
undeath Feature Requests 5 14,717 05-22-2012, 03:51 PM
    Thread: MD5(Unix) bug
Post: RE: MD5(Unix) bug

sounds like a hardware defect
undeath Very old oclHashcat-plus Support 5 10,038 10-14-2012, 05:45 PM
    Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks

you can try the OSC hash mode.
undeath Very old oclHashcat-lite Support 20 40,866 08-06-2012, 12:59 AM
    Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks

uhm, sorry. Seems like OSC is not supported by lite. Due to the way lite works you should not use a mask like 12345678?1?1?1?1 ... because lite relies on the first part of the plaintext not to be fixe...
undeath Very old oclHashcat-lite Support 20 40,866 08-06-2012, 01:26 AM
    Thread: md5(salt.pass) troubles and tricks
Post: RE: md5(salt.pass) troubles and tricks

OSC is md5(salt.pass), however it is not supported by lite. Read my other post.
undeath Very old oclHashcat-lite Support 20 40,866 08-06-2012, 01:58 AM
    Thread: MD5(salt.pass)
Post: RE: MD5(salt.pass)

for GPU cracking you can try OSC, but it is probably limited to two character salts.
undeath General Help 7 20,325 08-16-2012, 01:55 AM
    Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat

Either you implement a kernel on your own for such a hash mode or you do the encoding externally and pipe in the already base64-encoded words in a0 mode, but this will cost quite some performance and ...
undeath hashcat 3 2,375 10-30-2018, 09:42 AM
    Thread: md5($salt1,password,$salt2) ?
Post: RE: md5($salt1,password,$salt2) ?

Such an attack is not directly supported. You will have to emulate it using a suitable hashmode and a suitably choosen mask/rule.
undeath hashcat 5 3,104 11-09-2018, 12:20 PM
    Thread: MD5($salt.$pass) hashcat syntax, help?
Post: RE: MD5($salt.$pass) hashcat syntax, help?

I would suggest verifying the hash mode. Works for me.
undeath General Talk 4 22,428 12-29-2017, 11:50 PM
    Thread: MD5 With salt how to save only cracked hash with email etc
Post: RE: MD5 With salt how to save only cracked hash wi...

incorrect hash mode and/or missing salt
undeath hashcat 4 3,080 04-14-2018, 08:04 PM
    Thread: MD5 question
Post: RE: MD5 question

mdxfind should be able to handle this
undeath hashcat 6 2,051 10-31-2019, 12:08 PM
    Thread: MD5 mask for password
Post: RE: MD5 mask for password

pbies Wrote: (06-27-2018, 05:31 PM) -- Is it possible to bypass such computation? -- you can modify the source code pbies Wrote: (06-27-2018, 05:31 PM) -- For a good desktop PC is it possible to ...
undeath hashcat 3 2,962 06-27-2018, 05:39 PM