Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: [Help] Can someone teach me how to crack SMF (sha1($salt.$pass) ) pass with hashcat?
Post: CHEAP VIAGRA, BUY FACEBOOK STOCKS NOW

nailed it
undeath Old hashcat Support 8 21,614 05-22-2012, 04:57 PM
    Thread: Hashcat 0.12 no responding
Post: RE: Hashcat 0.12 no responding

why are you using --force? what happens when you omit this?
undeath Very old oclHashcat-plus Support 13 21,507 01-18-2013, 12:48 PM
    Thread: "brute force" and custom charset questions
Post: RE: "brute force" and custom charset questions

these are special characters interpreted by bash. You need to either (single) quote them or escape them.
undeath Very old oclHashcat-plus Support 5 21,488 11-29-2012, 07:44 PM
    Thread: "brute force" and custom charset questions
Post: RE: "brute force" and custom charset questions

? is the special character for hashcat masks. you need to do ?? to have the character ? in the mask
undeath Very old oclHashcat-plus Support 5 21,488 11-29-2012, 08:58 PM
    Thread: ERROR: cuModuleLoad() 301
Post: RE: ERROR: cuModuleLoad() 301

is your forceware driver properly installed?
undeath Old oclHashcat Support 12 21,453 01-12-2015, 07:30 PM
    Thread: hashcat-utils are being detected as trojans!
Post: RE: hashcat-utils are being detected as trojans!

Actually the best action is to yell at your antivirus sw vendor.
undeath hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 9 21,323 03-30-2016, 12:14 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

Yes, you want to do a mask attack https://hashcat.net/wiki/doku.php?id=mask_attack
undeath hashcat 25 21,256 08-08-2017, 11:43 AM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

slayerdiangelo Wrote: (08-08-2017, 03:21 PM) -- You should use the mask processor and pipe the output to Hashcat. -- Hashcat supports mask attacks in attack mode 3. No need to use external tools. ...
undeath hashcat 25 21,256 08-08-2017, 04:20 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

depends, if your wallet is mode 15600 [$ethereum$p] use your GPU (mining rig) if your wallet is mode 15700 [$ethereum$s] use your CPU (gaming machine) still use your mining rig (well, actually it mig...
undeath hashcat 25 21,256 08-08-2017, 06:42 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

use https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/run/ethereum2john.py to extract the necessary info from your wallet you're on the right track. To set the hash type consult --h...
undeath hashcat 25 21,256 08-09-2017, 12:00 AM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

4 H/s is really slow. Something seems off. As written before, my old 2600k manages to get 13 H/s. But why not using your GPU? It's probably still at least as fast as your CPU. Note that it may take ~2...
undeath hashcat 25 21,256 08-09-2017, 10:18 AM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

Did you try --scrypt-tmto=0? At least the example hash works for me with every tmto setting (though 0 is the fastest option on cpu and gpu in my scenario). --force is only if you use an unsupported...
undeath hashcat 25 21,256 08-09-2017, 05:38 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

I just learnt script-tmto=0 means auto-configuration, not disable tmto trade-offs alltogether. And furthermore, the higher the value the less RAM is used. However, there might be an incompatibility w...
undeath hashcat 25 21,256 08-10-2017, 04:55 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

take home message: the scrypt settings ethereum uses by default make GPU cracking mostly impossible. Just use your CPU.
undeath hashcat 25 21,256 08-10-2017, 05:35 PM
    Thread: So I'm dumb and lost my ETH password
Post: RE: So I'm dumb and lost my ETH password

scrypt has three parameters. Depending on how those parameters are chosen it may or may not work on GPU. The parameters of your ethereum wallet don't.
undeath hashcat 25 21,256 08-11-2017, 10:12 AM
    Thread: Pipe is slow
Post: RE: Pipe is slow

why not let oclhashcat apply the rules and just cat the wordlist? oclhashcat -r rules.file < wordlist
undeath Old oclHashcat Support 14 21,245 03-14-2015, 11:51 PM
    Thread: OpenCl kernel self-test failed when using any version later than v4.2.1 !!
Post: RE: OpenCl kernel self-test failed when using any ...

Did you actually read the error message you posted? Your driver is probably broken. There may be driver bugs that are triggered only by some hashcat versions.
undeath hashcat 29 21,222 01-30-2019, 01:23 PM
    Thread: Cracking salted md5
Post: RE: Cracking salted md5

format is hash:salt how the salt looks like doesn't matter
undeath Old oclHashcat Support 2 21,215 05-11-2014, 10:58 PM
    Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash

The wiki article you mention is about maskprocessor, not hashcat. If you use mp the candidates are generated on cpu. Using hashcat's a3 mode is always better than using mp if you don't need any spe...
undeath hashcat 8 21,164 09-02-2017, 08:59 PM
    Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash

Yes, if you pipe anything into hashcat (mp/pp/…) it's using your cpu. In general mask attack will be the fastest mode but with sufficient rules the speed of a wordlist attack should be pretty clo...
undeath hashcat 8 21,164 09-03-2017, 05:15 PM