Search Results
|
Post |
Author |
Forum |
Replies |
Views
[asc]
|
Posted |
|
|
Thread: Distributed Computing for cracking a long passwd
Post: RE: Distributed Computing for cracking a long pass...
|
undeath |
Very old oclHashcat-lite Support
|
22 |
46,737 |
07-25-2012, 07:56 PM |
|
|
Thread: cracking rar files
Post: RE: hashcat-gui v0.5.1 - not work perfectly
well, MacGyver might be able to do what you try, but no normal people. Really. |
|
undeath |
Old hashcat Support
|
4 |
45,623 |
04-22-2012, 02:02 AM |
|
|
Thread: Restore from settings
Post: RE: Restore from settings
radix Wrote: (03-18-2012, 01:14 PM)
--
Hashcat already contains a feature to restore a session based on your command line.
--
only -lite has a real restore feature |
|
undeath |
Feature Requests
|
15 |
45,546 |
03-18-2012, 03:07 PM |
|
|
Thread: Rule Piping Request
Post: RE: Rule Piping Request
how about using oclHashcat with -j option? |
|
undeath |
Feature Requests
|
20 |
45,518 |
11-17-2011, 09:46 PM |
|
|
Thread: Rule Piping Request
Post: RE: Rule Piping Request
the problem is not generating the rules at all but storing them. |
|
undeath |
Feature Requests
|
20 |
45,518 |
11-18-2011, 02:15 PM |
|
|
Thread: Missing partial password chunk in LM cracking
Post: RE: Missing partial password chunk in LM cracking
the beta versions are not publicly available. |
|
undeath |
Very old oclHashcat-lite Support
|
23 |
45,287 |
02-23-2012, 12:51 PM |
|
|
Thread: Missing partial password chunk in LM cracking
Post: RE: Missing partial password chunk in LM cracking
atom Wrote: (02-23-2012, 05:07 PM)
--
@f0cker thats the correct behaivior. if its not correct displayed in your shell its more likely its a terminal emulation problem.
--
it sounds like hashcat is ... |
|
undeath |
Very old oclHashcat-lite Support
|
23 |
45,287 |
02-23-2012, 05:11 PM |
|
|
Thread: Benchmark feature for cpu hashcat
Post: RE: Benchmark feature for cpu hashcat
Device: Intel(R) Core(TM) i7-2600K CPU @ 3.40GHz
Instruction set: AVX
Code:
--
Hashtype.: MD4
Speed/sec: 104.25M words
Hashtype.: MD5
Speed/sec: 87.97M words
Hashtype.: SHA1
Speed/sec: 6... |
|
undeath |
Old hashcat Support
|
12 |
45,162 |
11-03-2014, 09:43 PM |
|
|
Thread: Benchmark feature for cpu hashcat
Post: RE: Benchmark feature for cpu hashcat
Y U NO USE PROPER IS-BIN FOR YOUR CPU? |
|
undeath |
Old hashcat Support
|
12 |
45,162 |
01-07-2015, 01:22 AM |
|
|
Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?
did not read properly. meh. |
|
undeath |
Old oclHashcat Support
|
30 |
45,002 |
04-05-2015, 10:26 PM |
|
|
Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?
InfDoleo Wrote: (04-09-2015, 03:36 AM)
--
Any chance in the next version, one side of the combo attack can be piped?
--
use a fifo |
|
undeath |
Old oclHashcat Support
|
30 |
45,002 |
04-09-2015, 05:03 PM |
|
|
Thread: How do I crack substr hash?
Post: RE: How do I crack substr hash?
here is some python code. works the same as atom's code but instead of a single hash you specify a hash list. However it's way slower. (at least for small amounts of hashes)
https://pastebin.com/ZFv... |
|
undeath |
Old hashcat Support
|
22 |
44,499 |
01-26-2013, 12:59 AM |
|
|
Thread: HELP!!!
Post: RE: HELP!!!
Maybe put your finger into the fan while it's spinning. Will remove dust and stuff. And is 1125MHz really everything you can do to that card? |
|
undeath |
Hardware
|
28 |
44,365 |
02-09-2013, 01:22 AM |
|
|
Thread: htpasswd decrypt ?
Post: RE: htpasswd decrypt ?
apache's htpasswd support many password hashes, ranging from plain to DES-crypt to unix-md5 (and possibly other unix-* hashes) to apache ("apr") hashes. |
|
undeath |
Old oclHashcat Support
|
4 |
43,637 |
03-26-2014, 11:48 AM |
|
|
Thread: Done my research, now I need a review. 20 GPU cracking cluster.
Post: RE: Done my research, now I need a review. 20 GPU...
you can get a preconfigured system at https://sagitta.pw/ |
|
undeath |
Hardware
|
27 |
43,055 |
02-04-2016, 12:05 PM |
|
|
Thread: mp64: generate total random words
Post: RE: mp64: generate total random words
you might be interested in the fingerprint attack. Take a close look at the expander. (hashcat-utils) |
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
20 |
42,461 |
04-23-2012, 12:47 PM |
|
|
Thread: mp64: generate total random words
Post: RE: mp64: generate total random words
|
undeath |
hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip
|
20 |
42,461 |
05-06-2012, 04:21 PM |
|
|
Thread: ERROR: cuMemcpyDtoH() 700
Post: RE: ERROR: cuMemcpyDtoH() 700
squadx Wrote: (02-20-2013, 06:18 PM)
--
So to be clear what I am reading
"Sure, you can easily do -1 012345 9?1?d?d?d?d?d?d "
So to get the remainder of the values in that 9000000000-999999999
Afte... |
|
undeath |
Very old oclHashcat-plus Support
|
28 |
41,855 |
02-20-2013, 07:34 PM |
|
|
Thread: ERROR: cuMemcpyDtoH() 700
Post: RE: ERROR: cuMemcpyDtoH() 700
no exactly. It would not go up to 9100000000 but only 9099999999 |
|
undeath |
Very old oclHashcat-plus Support
|
28 |
41,855 |
02-21-2013, 12:00 AM |
|
|
Thread: Same command, different output?
Post: RE: Same command, different output?
but at least cpu hashcat should crack all hashes that have been cracked by oclhashcat. Something doesn't seem right.
For speed comparisons you have to do a mask attack. Dictionary without rules w... |
|
undeath |
Old hashcat Support
|
21 |
41,732 |
12-16-2012, 06:53 PM |