Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Begginer cracking
Post: RE: Begginer cracking

here is a benchmark, do the math yourself :) https://hashcat.net/forum/thread-6743-post-36041.html#pid36041
undeath Hardware 6 5,746 03-22-2018, 07:57 PM
    Thread: bcrypt salt format
Post: RE: bcrypt salt format

Thanks for uncovering that, philsmd. Why are people so stupid? Security by obscurity ftw edit: looks like this is from a leaked database
undeath hashcat 4 4,539 12-09-2017, 12:20 PM
    Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix

if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4
undeath General Talk 2 2,127 09-27-2018, 04:14 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

https://hashcat.net/forum/thread-7686.html?highlight=stdin
undeath hashcat 12 18,675 11-21-2018, 11:43 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

brute-forcing bcrypt is not feasible.
undeath hashcat 12 18,675 11-22-2018, 05:36 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible.
undeath hashcat 12 18,675 11-22-2018, 06:14 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Mem5 Wrote: (11-23-2018, 12:14 AM) -- Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds. -- With cost factor 12? I think you're being a little too optimistic :D
undeath hashcat 12 18,675 11-23-2018, 04:50 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel.
undeath hashcat 12 18,675 11-28-2018, 02:41 PM
    Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash

is anything unclear about this warning? Code: -- * Device #2: Skipping unstable hash-mode 3200 for this device. You can use --force to override, but do not report related errors. --
undeath hashcat 5 5,603 02-27-2018, 06:36 PM
    Thread: Bcrypt Blowfish Unix Hash
Post: RE: Bcrypt Blowfish Unix Hash

ok, I'll translate the message for you: Quote: -- hash mode 3200 is known to be broken on this device. I'm refusing to run it. If you still want to run this hash mode on your broken device you can d...
undeath hashcat 5 5,603 02-27-2018, 06:53 PM
    Thread: bcript+salt?
Post: RE: bcript+salt?

i don't know what Y is, but bcrypt has its native salt encoded in the hash string. If you have an additional salt that is non-standard and you have to do non-standard things.
undeath hashcat 8 5,602 07-12-2018, 06:54 PM
    Thread: bcript+salt?
Post: RE: bcript+salt?

What command are you running to crack the example hash and what output do you receive?
undeath hashcat 8 5,602 07-15-2018, 05:45 PM
    Thread: bcript+salt?
Post: RE: bcript+salt?

Don't install the sdk, only install the normal driver.
undeath hashcat 8 5,602 07-16-2018, 03:53 PM
    Thread: Basic Questions - Hashs
Post: RE: Basic Questions - Hashs

You are very inpatient. Also this forum is about cracking hashes, not acquiring some.
undeath General Help 5 9,892 10-18-2012, 09:52 PM
    Thread: basic question hardware build
Post: RE: basic question hardware build

unless you need cpu cracking the cpu isn't important at all. 2gb of ram are also sufficient. All that matters is vram. You don't need a fast harddisk either. Even PCIe x1 would be enough per card. If ...
undeath Hardware 2 5,765 01-27-2014, 04:37 PM
    Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw

It's a bunch of base64-encoded binary data but that's really all you can say. What makes you think it's hashes at all?
undeath hashcat 6 5,011 05-21-2018, 08:39 PM
    Thread: base64 + MD5-raw
Post: RE: base64 + MD5-raw

Wouldn't some kind of encryption be much more likely, given that it seems to store some kind of extractable information?
undeath hashcat 6 5,011 05-21-2018, 11:33 PM
    Thread: Base password permutations
Post: RE: Base password permutations

generate rule files with rules for what you want to do
undeath General Talk 2 2,148 09-17-2018, 11:23 PM
    Thread: backslash(\) slow down md5 speed
Post: RE: backslash(\) slow down md5 speed

Static prefixes in a mask attack slow down the attack, that's a known limitation in hashcat. Avoid static prefixes if possible and try to change your attack.
undeath General Talk 2 2,317 11-11-2018, 02:21 AM
    Thread: Axcrypt support
Post: RE: Axcrypt support

if the example hash does not have keyfile data it's quite likely that this feature is not supported by hashcat.
undeath hashcat 28 15,225 06-27-2018, 11:49 PM