Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: error
Post: RE: error

Probably a problem with your opencl runtime. What device are you using?
undeath hashcat 7 5,738 05-21-2018, 11:16 AM
    Thread: Electrum-3.3.4
Post: RE: Electrum-3.3.4

hashcat is free open source software. You can program the module yourself or hire someone to do it for you.
undeath hashcat 8 3,432 09-13-2019, 12:59 PM
    Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...

Posting hashes is against the rules. However, hash loads without problems for me. What's your command line?
undeath Beta Tester 4 1,400 03-09-2020, 01:29 AM
    Thread: Electrum 4 and 5 Token length exception (ver 5.1.0+1736)
Post: RE: Electrum 4 and 5 Token length exception (ver ...

Code: -- hashcat -h | grep -i electrum 16600 | Electrum Wallet (Salt-Type 1-3) | Password Managers 21700 | Electrum Wallet (Salt-Type 4) | Password Ma...
undeath Beta Tester 4 1,400 03-09-2020, 01:54 AM
    Thread: Efficient way to store hashes in database ?
Post: RE: Efficient way to store hashes in database ?

if you only need to store user passwords, store a base64 encoded string of the hash.
undeath General Talk 5 15,747 08-07-2012, 07:45 PM
    Thread: Efficiency Question - Wordlists or rules-on-the-fly
Post: RE: Efficiency Question - Wordlists or rules-on-th...

For slow hashes it does not really matter but for fast hashes piping is slower because everything needs to be transferred from CPU to GPU.
undeath General Talk 1 3,518 02-03-2016, 09:48 PM
    Thread: Effects of unequal RAM and VRAM in rig
Post: RE: Effects of unequal RAM and VRAM in rig

Not enough RAM leads to CL_OUT_OF_HOST_MEMORY errors. It won't slow down things. MD5/NTLM should be good candidates for stability testing, although there might be even better ones.
undeath Hardware 1 1,960 09-25-2018, 02:23 PM
    Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing

Hashing algorithms are usually not vulnerable to quantum computer attacks. Attacks against cryptographic algorithms mostly rely on being able to solve a very small but important set of mathematical pr...
undeath General Talk 4 4,982 09-10-2017, 06:08 PM
    Thread: ECC and SHA 256 vs quantum computing
Post: RE: ECC and SHA 256 vs quantum computing

According to this paper (https://dl.acm.org/citation.cfm?id=2011531) it would require 1000 qubits to break ECC-160. As I said in my previous post, hashing algorithms are usually not vulnerable to q...
undeath General Talk 4 4,982 09-11-2017, 04:12 PM
    Thread: Dusted off old gaming laptop
Post: RE: Dusted off old gaming laptop

Your device is too old.
undeath General Talk 3 980 04-27-2020, 10:26 PM
    Thread: DS2432 brute force
Post: RE: DS2432 brute force

a sha1 hash consists of 20 bytes so whatever you have there does not seem to be a sha1 hash at all. Actually I have never heard of a hash consisting of 8 bytes. (if your salt consists of 56 bytes it d...
undeath Very old oclHashcat-lite Support 5 12,415 12-08-2011, 03:43 AM
    Thread: DS2432 brute force
Post: RE: DS2432 brute force

as long as you expect the password to only consist of valid ascii characters with no specials or control characters the password should be bruteforced within some days using a recent gpu. But if you e...
undeath Very old oclHashcat-lite Support 5 12,415 12-08-2011, 04:14 AM
    Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack

Using toggle rules fulfills the same goal and is much better because you can combine with other rules as well. I don't think there is real use for -a4.
undeath Beta Tester 11 10,338 08-13-2012, 10:50 AM
    Thread: Dropping support for -a 4 permutation-attack
Post: RE: Dropping support for -a 4 permutation-attack

oh, damn. mixed that up with case mutation. But whatever, i think most used scenario is something like fingerprint where you tend to combine two such permutated dictionaries. So no real use for this e...
undeath Beta Tester 11 10,338 08-13-2012, 10:53 AM
    Thread: drivers
Post: RE: drivers

there are plans, but unless AMD fixes their crappy drivers this will not happen.
undeath Very old oclHashcat-plus Support 2 5,113 12-19-2012, 10:47 AM
    Thread: Double SHA1
Post: RE: Double SHA1

You could either code a custom hash mode for this or write a converter that generates all possible hashes from the concatenated numbers you have.
undeath Old oclHashcat Support 9 13,637 06-20-2016, 05:40 PM
    Thread: Double Salted Hash - SHA1 and SHA256
Post: RE: Double Salted Hash - SHA1 and SHA256

this format is unsupported.
undeath Old hashcat Support 1 6,325 12-05-2012, 12:46 AM
    Thread: double md5 not working
Post: RE: double md5 not working

damn, forgot to upgrade my drivers :/ Thank you.
undeath Very old oclHashcat-plus Support 2 6,111 09-18-2012, 09:26 PM
    Thread: Done my research, now I need a review. 20 GPU cracking cluster.
Post: RE: Done my research, now I need a review. 20 GPU...

you can get a preconfigured system at https://sagitta.pw/
undeath Hardware 27 43,078 02-04-2016, 12:05 PM
    Thread: Don't work Sha-1(base-64)
Post: RE: Don't work Sha-1(base-64)

these are not exactly SHA1 hashes but base64(hex(sha1($pass))) ones. You need to base64-decode the hashes before you can crack them.
undeath Old hashcat Support 6 12,366 01-18-2012, 10:03 PM