Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Variable mask in the middle of the password
Post: RE: Variable mask in the middle of the password

You already mentioned the solution for dicts in your first post: write a rule to append/prepend your suffix/prefix.
undeath hashcat 5 3,849 03-18-2018, 10:38 AM
    Thread: Value of --pw-max must be smaller or equal to 32
Post: RE: Value of --pw-max must be smaller or equal to ...

the cause for this problem is that your password candidates may only be up to 32 bytes long.
undeath Old hashcat Support 12 16,016 12-06-2015, 08:48 PM
    Thread: Value of --pw-max must be smaller or equal to 32
Post: RE: Value of --pw-max must be smaller or equal to ...

not with hashcat, correct.
undeath Old hashcat Support 12 16,016 12-06-2015, 09:12 PM
    Thread: v1.33 is much slower than v1.21,Can anyone test it
Post: RE: v1.33 is much slower than v1.21,Can anyone tes...

did you read this thread? https://hashcat.net/forum/thread-4161.html
undeath Old oclHashcat Support 4 7,885 03-06-2015, 03:52 PM
    Thread: Utilising the gpu in a headless envrionment
Post: RE: Utilising the gpu in a headless envrionment

this works for amd, too, but you won't have temp (and/or utilization?) shown for amd cards.
undeath General Help 3 7,145 06-20-2014, 06:33 PM
    Thread: Using WPA2 DK PSK (derrived Key) instead of 4Way Handshake
Post: RE: Using WPA2 DK PSK (derrived Key) instead of 4W...

PBKDF2(Passphrase,SSID,SSID.length,2096,256) This does not describe anything. PBKDF2 needs a hashing algorithm. To answer your question: hashcat has no generic handler for PBKDF2.
undeath Old oclHashcat Support 6 12,165 09-03-2014, 01:31 AM
    Thread: Using the new md5($salt.$pass.$salt) mode
Post: RE: Using the new md5($salt.$pass.$salt) mode

it only takes one salt as far as i can see.
undeath Old oclHashcat Support 4 7,540 10-15-2014, 09:49 AM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

yes, performance is better with m20 if you have a static prefix. hash format is usually Code: -- hexhash:salt --
undeath hashcat 16 9,677 04-25-2018, 11:26 AM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

how did you create the hash?
undeath hashcat 16 9,677 04-25-2018, 12:05 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

The syntax looks correct. I suspect you made a mistake when creating the hash. Can you post the whole command?
undeath hashcat 16 9,677 04-25-2018, 01:06 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

you can squeeze out a little more performance (while rendering your PC hardly usable) by using -w3 or even -w4 Other than that the most time you can save by running clever attacks.
undeath hashcat 16 9,677 04-25-2018, 05:59 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

targeted wordlists, targeted rules, more narrow masks, …
undeath hashcat 16 9,677 04-25-2018, 11:24 PM
    Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...

You're missing "-m" in front of the hash mode and "--increment 17:19" is absolutely the wrong syntax. Where did you find that?
undeath hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 13 5,771 08-18-2019, 07:13 PM
    Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...

Code: -- hashcat -h | grep increment -i, --increment | | Enable mask increment mode | --increment-min | Num | Start mask incrementing...
undeath hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 13 5,771 08-19-2019, 12:24 PM
    Thread: Using hashcat with maskprocessor - here: veracrypt
Post: RE: Using hashcat with maskprocessor - here: verac...

I don't think the mask 'part_I_remember?d?s' does what you want. It tries candidates that start with "part_I_remember" followed by exactly one digit followed by exactly one special character. I gue...
undeath hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 13 5,771 08-19-2019, 05:09 PM
    Thread: using hashcat to generate file-checksums
Post: RE: using hashcat to generate file-checksums

File checksumming on gpu would make not much sense because PCIe throughput would be the bottleneck. Besides, GPUs are fast because they have so many cores and can do many computations parallelly. That...
undeath General Talk 4 3,491 01-21-2018, 01:11 PM
    Thread: using hashcat to generate file-checksums
Post: RE: using hashcat to generate file-checksums

Sorry, I misread your statement about the bottleneck. Most checksum functions are not designed to allow parallel processing of a single hashing operation and the sha1/2 familiy is one of that. (due...
undeath General Talk 4 3,491 01-21-2018, 04:06 PM
    Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...

If you had used the forum's search function you could have learnt that ethereum support was added in version 3.6.0. You can extract the necessary info from your wallet file using this script: https...
undeath hashcat 21 25,960 06-18-2017, 08:31 PM
    Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...

You need to specify the correct hash mode (-m). To avoid any interference with your shell you best save the string in a text file.
undeath hashcat 21 25,960 06-19-2017, 10:15 AM
    Thread: Using hashcat to find v3 ethereum wallet password
Post: RE: Using hashcat to find v3 ethereum wallet passw...

try using --scrypt-tmto 4
undeath hashcat 21 25,960 06-19-2017, 07:45 PM