Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: Can't reverse known hash ?
Post: RE: Can't reverse known hash ?

It will use the default mask.
undeath Old oclHashcat Support 15 18,779 08-13-2015, 03:29 PM
    Thread: [Bug 0.14] Wrong hash target [Visual Bug]
Post: RE: [Bug? 0.14] Wrong hash target

can reproduce Code: -- ../oclHashcat-lite-0.14/oclHashcat-lite64.bin deadbeefdeadbeefdeadbeefdeadbeefdeadbeef:abcdef -m110 "?d?d?d?d?d?d?d?a?d?a?d?d" --pw-min=10 --pw-max=12 --hex-salt oclHashcat-li...
undeath Very old oclHashcat-lite Support 10 18,755 02-05-2013, 11:46 AM
    Thread: [Bug 0.14] Wrong hash target [Visual Bug]
Post: RE: [Bug? 0.14] Wrong hash target

this is not related to this bug and should therefore be in a new thread. Also hashcat works heavily multithreaded, unless you run on cpu with -n1 it will always "mix" the results.
undeath Very old oclHashcat-lite Support 10 18,755 02-05-2013, 06:10 PM
    Thread: [Bug 0.14] Wrong hash target [Visual Bug]
Post: RE: [Bug? 0.14] Wrong hash target

what i said applies to every version of oclhashcat-* too.
undeath Very old oclHashcat-lite Support 10 18,755 02-05-2013, 06:55 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

https://hashcat.net/forum/thread-7686.html?highlight=stdin
undeath hashcat 12 18,677 11-21-2018, 11:43 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

brute-forcing bcrypt is not feasible.
undeath hashcat 12 18,677 11-22-2018, 05:36 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Hashing is not encrpytion. You cannot decrypt a hash. There is no guaranteed way ever to crack a hash. I'm not saying you cannot crack bcrypt. But brute-force is not feasible.
undeath hashcat 12 18,677 11-22-2018, 06:14 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

Mem5 Wrote: (11-23-2018, 12:14 AM) -- Assuming you have a GTX 1080 Ti, you will try ~23'000 passwords per seconds. -- With cost factor 12? I think you're being a little too optimistic :D
undeath hashcat 12 18,677 11-23-2018, 04:50 PM
    Thread: bcrypt hash with salt
Post: RE: bcrypt hash with salt

The salt is usually part of the bcrypt hash itself. If you have an additional salt that is non-standard and you either have to incorporate it into your attack somehow or hack the kernel.
undeath hashcat 12 18,677 11-28-2018, 02:41 PM
    Thread: salted md5
Post: RE: salted md5

get some cmd crash course. You must not include the leading path. Also your mask is now totally fucked.
undeath Old hashcat Support 9 18,644 11-03-2012, 12:01 PM
    Thread: salted md5
Post: RE: salted md5

you are using the wrong hash mode. Have a look at --help With issuing the previous command you deleted oclhashcat-lite64.exe (it is a 0 bytes file now). Redownload/extract the exe again.
undeath Old hashcat Support 9 18,644 11-03-2012, 12:45 PM
    Thread: [HowTo] Depot oclHashcat-plus's hashcat.pot perfectly
Post: RE: [HowTo] Depot oclHashcat-plus's hashcat.pot pe...

because the salt might include colons as well.
undeath General Talk 6 18,483 07-31-2012, 01:11 PM
    Thread: 1080ti slow speed performance WPA/WPA2
Post: RE: 1080ti slow speed performance WPA/WPA2

Why are you using --force? Try with -w4
undeath hashcat 13 18,419 02-02-2018, 04:36 PM
    Thread: It never stops running
Post: RE: It never stops running

you can see the progress when hitting "s"
undeath Very old oclHashcat-plus Support 13 18,333 01-29-2013, 02:34 AM
    Thread: Help with wordlists - cracking md5(unix)
Post: RE: Help with wordlists - cracking md5(unix)

unix-md5 is a slow algorithm and perfect for a gpu.
undeath Old oclHashcat Support 8 18,215 02-06-2014, 02:48 PM
    Thread: old version hashcat
Post: RE: old version hashcat

if you can't install/run 14.9 you can't run oclhashcat.
undeath Old hashcat Support 11 18,195 12-26-2014, 09:43 PM
    Thread: oclHashcat Help Plz
Post: RE: oclHashcat Help Plz

tl;dr posting your hashes is forbidden
undeath Old oclHashcat Support 8 18,134 06-12-2014, 08:49 PM
    Thread: ASIC support?
Post: RE: ASIC support?

just off the top of my head hashcat doesn't support any of these implementations.
undeath Very old oclHashcat-lite Support 6 18,113 07-24-2013, 09:15 AM
    Thread: Custom password separator in md5($salt.$pass)
Post: RE: Custom password separator in md5($salt.$pass)

This is because atom creates custom optimized modules per hash type. If anyone requests md5($salt.$pass) with a 9 char salt (your 8 random chars + "/"), your hashes will be as weak as any other salted...
undeath Very old oclHashcat-plus Support 7 18,059 04-11-2012, 12:24 AM
    Thread: Custom password separator in md5($salt.$pass)
Post: RE: Custom password separator in md5($salt.$pass)

As you already realized, cracking this is no problem at all. I think "security through obfuscation" applies here. Never do this, when there is a better way of solving your problem! The reason for c...
undeath Very old oclHashcat-plus Support 7 18,059 04-11-2012, 01:04 AM