Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Mask attack with brain
Post: RE: Mask attack with brain

What's your whole command line?
undeath hashcat 5 3,638 12-08-2018, 02:21 PM
    Thread: Mask attack with brain
Post: RE: Mask attack with brain

That indeed looks like a missing feature. Technically, when using brain-client-features=2 there should be no need to enable -S, but it looks like hashcat is still using it.
undeath hashcat 5 3,638 12-08-2018, 07:36 PM
    Thread: Mask attack help
Post: RE: Mask attack help

zap44 Wrote: (02-11-2018, 01:04 AM) -- Based on my limited knowledge, I know that the password is in the range of 60521739 -> 67646497 from the information above. -- Wrong. Based on the information...
undeath hashcat 5 6,232 02-11-2018, 01:09 AM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

1. Easier on a mathematical level? Yes. Easier on a practical level? No. 2. Pure hashcat masks cannot do this. maskprocessor has options for this. 3. (94^12 / $hashrate) will give you a rough, optim...
undeath hashcat 7 2,034 09-30-2019, 09:51 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

-q 1 is redundant with -r 1 but according to your first post "rxMX8$cQ$4RZ" is a valid example (it includes two dollar signs), hence I assumed you were referring to consecutive occurrences.
undeath hashcat 7 2,034 09-30-2019, 10:44 PM
    Thread: mask attack for non-repeating chars
Post: RE: mask attack for non-repeating chars

Not sure how you deduce your divisor to be 1.5 after determining your hashrate to be 3000 but your conclusion is correct nonetheless.
undeath hashcat 7 2,034 10-01-2019, 09:07 PM
    Thread: Mask Attack
Post: RE: Mask Attack

Your description is pretty confused. Thread title says something about mask attack, yet you write about a wordlist of some kind. Can you clarify what exactly you want to do? What is this wordlist y...
undeath hashcat 5 1,789 12-24-2019, 04:04 PM
    Thread: Mask Attack
Post: RE: Mask Attack

princeprocessor (https://hashcat.net/wiki/doku.php?id=princeprocessor) does almost what you want but it will also use words multiple times, eg yumyumyum To append the fixed part "24" you can add a ...
undeath hashcat 5 1,789 01-01-2020, 12:25 PM
    Thread: Mask Assisstance
Post: RE: Mask Assisstance

A hybrid attack (mode 6) would make more sense. Get an english wordlist and use a mask like ?s20?d?d
undeath General Talk 6 4,039 01-02-2018, 09:27 PM
    Thread: Mask Assisstance
Post: RE: Mask Assisstance

bruteforcing this keyspace is not going to happen any time soon unless the word is really short. edit: 9 7 random lowercase characters? lol. not happening during your lifetime. edit: whoops, I don...
undeath General Talk 6 4,039 01-02-2018, 09:37 PM
    Thread: Mask >10 years for 11 char lowercase, decimal WPA2 hash
Post: RE: Mask >10 years for 11 char lowercase, decimal ...

seems legit.
undeath Old oclHashcat Support 5 7,691 03-08-2015, 02:27 PM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

What hash mode are you attacking? If it's a slow one the easiest way would be to have a rule double the word and append + prepend the known part. If you want to combine that with a mask attack you can...
undeath hashcat 8 6,282 02-22-2018, 10:36 AM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

https://hashcat.net/wiki/doku.php?id=rule_based_attack
undeath hashcat 8 6,282 02-24-2018, 12:16 PM
    Thread: Mask + Brute Force with repeated password
Post: RE: Mask + Brute Force with repeated password

can you post your full command line?
undeath hashcat 8 6,282 03-02-2018, 12:24 AM
    Thread: mask
Post: RE: mask

specify the path to that file instead of a mask
undeath General Talk 2 2,453 06-30-2018, 10:03 AM
    Thread: markov threshold for second run through
Post: RE: markov threshold for second run through

no There was an error posting your reply: The message is too short. Please enter a message longer than 5 characters.
undeath General Help 2 4,753 07-30-2015, 02:20 AM
    Thread: markov mode
Post: RE: markov mode

Why are you using statsprocessor instead of hashcat's native markov support? Piping words in will almost always be slower. Also, you should specify a mask.
undeath hashcat 6 1,079 05-22-2020, 10:25 PM
    Thread: Many symbols how separator (--separator)
Post: RE: Many symbols how separator (--separator)

Using mulitple delimiter characters isn't really a solution, just a workaround. Use hex-salt.
undeath Old oclHashcat Support 2 4,281 02-13-2016, 02:12 PM
    Thread: Magento ?
Post: RE: Magento ?

according to that post it's md5(salt.pass)
undeath General Help 2 8,690 07-19-2013, 09:07 AM
    Thread: m02500_aux1nullGBE): error: failed in Gen backend.
Post: RE: m02500_aux1nullGBE): error: failed in Gen back...

you should remove pocl and install the intel opencl cpu runtime
undeath hashcat 7 2,592 11-21-2019, 07:57 PM