Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: Salt input and bruteforcing
Post: RE: Salt input and bruteforcing

is the "number(1 to 9).1234567890876543" part fixed? If so you should add it to the salt. You don't need to define ?1 for a single character. You can simply use that character in the mask.
undeath hashcat 3 2,136 11-09-2018, 12:17 PM
    Thread: Performance Stats
Post: RE: Performance Stats

If you care only for a single hash/list of hashes you can quickly write a wrapper script. Otherwise, no, not possible.
undeath hashcat 1 2,133 08-07-2017, 03:35 PM
    Thread: Bcrypt Prefix
Post: RE: Bcrypt Prefix

if your cost factor is 4 (note: bcrypt does not have a iteration/round indicator) your prefix is probably $2y$4
undeath General Talk 2 2,127 09-27-2018, 04:14 PM
    Thread: How to configure a thin brute force in hashcat?
Post: RE: How to configure a thin brute force in hashcat...

not supported
undeath hashcat 2 2,124 12-08-2018, 11:50 PM
    Thread: hashcat64 4.2.1 getting killed OOM
Post: RE: hashcat64 4.2.1 getting killed OOM

Ideally you have as much RAM as you have VRAM. The lower limit for available system RAM hashcat requires was set to 2GB per opencl device if I remember correctly. (thus, running with only three device...
undeath hashcat 2 2,121 09-17-2018, 10:46 PM
    Thread: Excel 2016 Workbook Hash
Post: RE: Excel 2016 Workbook Hash

hashcat can only crack passwords of encrypted office documents, not protected ones.
undeath hashcat 2 2,112 05-27-2019, 07:23 PM
    Thread: Custom Hash Algorithm / Modify or Add new mode
Post: RE: Custom Hash Algorithm / Modify or Add new mode

No, those were manually re-hashed.
undeath hashcat 3 2,091 08-22-2019, 04:13 PM
    Thread: Retrieve SALT from VALUE and SHA256(value.salt)
Post: RE: Retrieve SALT from VALUE and SHA256(value.salt...

32 byte salt is impossible to brute-force, assuming that means 32*8 bits. A little less would still be impossible to brute-force (ie 32*7). All other security properties are trivially fulfilled under...
undeath hashcat 2 2,089 11-20-2018, 01:48 AM
    Thread: same attack, no results
Post: RE: same attack, no results

If you want to resume an attack you should use the session restore feature or the brain server.
undeath hashcat 3 2,087 04-23-2019, 09:59 PM
    Thread: adding additional GPU to Brutalis | Hashstack
Post: RE: adding additional GPU to Brutalis | Hashstack

afaik you get an unrestricted usage license as long as you're a Sagitta HPC customer. But it's certainly something you should ask their sales department about directly.
undeath Hardware 2 2,078 04-24-2019, 05:32 PM
    Thread: GPU not utilised
Post: RE: GPU not utilised

srin2godisgreat Wrote: (10-07-2019, 08:40 PM) -- From the output of the task manager and the status output of hashcat, it looks like only the cpu is being used. -- I have no idea how you come to th...
undeath hashcat 4 2,076 10-08-2019, 03:46 PM
    Thread: Recommendation for building a Hash Cracking Rig in 2020?
Post: RE: Recommendation for building a Hash Cracking Ri...

Since the 2000 series FE cards are no longer recommended because they don't have a blower fan any longer and thus are not suitable for stacking multiple cards in one case. For RAM the rule of thumb...
undeath Hardware 4 2,074 07-08-2020, 08:49 PM
    Thread: Decoding multiple PMKID SSIDs
Post: RE: Decoding multiple PMKID SSIDs

wlanhcxinfo of https://github.com/ZerBea/hcxtools should be able to do all you need.
undeath General Talk 4 2,073 10-13-2019, 12:07 PM
    Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...

CracktainCrunch Wrote: (07-07-2020, 01:21 AM) -- It would essentially be a brute force attack but with pre-generated passwords that one would use in a dict attack I guess. -- I'm not sure what brou...
undeath General Talk 10 2,064 07-07-2020, 10:02 AM
    Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...

CracktainCrunch Wrote: (07-06-2020, 12:00 PM) -- Like taking already cracked passwords that were randomly generated and jumble them up or something like that? -- That's what rule-based attacks do (...
undeath General Talk 10 2,064 07-06-2020, 03:25 PM
    Thread: Feasible method of cracking long, randomised passwords?
Post: RE: Feasible method of cracking long, randomised p...

If you are certain the password is random and not derived from some word or otherwise human-chosen you will not be able to crack that rar file. CracktainCrunch Wrote: (07-07-2020, 08:24 PM) -- I u...
undeath General Talk 10 2,064 07-08-2020, 08:29 PM
    Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'

You can use princeprocessor for this. It can handle everything but the space between the words. Toggling the case of the first character can be done with a hashcat rule.
undeath hashcat 6 2,052 08-30-2019, 09:36 PM
    Thread: Some way to 'increment from a wordlist'
Post: RE: Some way to 'increment from a wordlist'

Yes, you could simply append a space to every word in your wordlist for that case. Just remember to add a rule in hashcat that deletes the trailing space of the last word.
undeath hashcat 6 2,052 08-30-2019, 09:43 PM
    Thread: MD5 question
Post: RE: MD5 question

mdxfind should be able to handle this
undeath hashcat 6 2,051 10-31-2019, 12:08 PM
    Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length

this attack works: Code: -- hashcat -m10 $(python -c 'print("da8e187436ef310167021504d28c9b68"+":"+"00"*255)') -a3 '?b' --hex-salt -- although hashcat's mask parser should probably be patched to all...
undeath hashcat 6 2,043 10-09-2019, 06:06 PM