Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author [asc] Forum Replies Views Posted
    Thread: Proper method to extract the hash from a PDF file?
Post: RE: Proper method to extract the hash from a PDF f...

It should be enough to use the right mode. You can use this as a reference: https://hashcat.net/wiki/doku.php?id=example_hashes
atom Old oclHashcat Support 11 43,599 03-27-2015, 01:20 PM
    Thread: email:hash to email:unhash?
Post: RE: email:hash to email:unhash?

I'd recommend to stick to --username and --show https://hashcat.net/forum/thread-4136.html
atom Old hashcat Support 4 23,149 03-27-2015, 01:21 PM
    Thread: Question about keyspace
Post: RE: Question about keyspase

Yes, you need to modify your script
atom Old oclHashcat Support 3 5,090 03-27-2015, 01:22 PM
    Thread: Proper method to extract the hash from a PDF file?
Post: RE: Proper method to extract the hash from a PDF f...

Well, there is no regexp in hashcat. But using my reference you should be able to write your own
atom Old oclHashcat Support 11 43,599 03-27-2015, 01:33 PM
    Thread: Question about keyspace
Post: RE: Question about keyspase

yes exactly
atom Old oclHashcat Support 3 5,090 03-27-2015, 10:59 PM
    Thread: WPA Combination attack (skipping passwords)
Post: RE: WPA Combination attack (skipping passwords)

Since -a1 (and -a6 and -a7 as well) change the length of the password candidate on gpu, there's no way to skip them anymore. If you want them skipped, use combinator.bin from hashcat-utils and pipe
atom Old oclHashcat Support 2 5,123 03-30-2015, 11:07 AM
    Thread: Combinator attack not recognizing -j rule
Post: RE: Combinator attack not recognizing -j rule

I can reproduce the problem. Please open a TRAC Ticket. There's a workaround: Instead of "-j $-" you can use "-k i0-". PS: You could also use ^ but ^ is the escape character on windows, so you m...
atom Old oclHashcat Support 4 7,718 03-30-2015, 11:17 AM
    Thread: des / 3des question
Post: RE: des / 3des question

As I said already, you can't brute-forece AES or 3DES. The only chance is if there's a human involved in the crypto process. If a human chooses a password it's typically send through a KDF which is th...
atom General Help 4 7,791 03-30-2015, 11:21 AM
    Thread: hybrid dic + mask
Post: RE: hybrid dic + mask

You can not do this with a hybrid attack. But you can do it with stacked rules: ./oclHashcat -a 0 hash.txt -r rules/hybrid/prepend_d.rule -r rules/hybrid/append_d.rule this would by like: ?dD...
atom General Help 2 4,946 03-30-2015, 11:24 AM
    Thread: Combinator attack not recognizing -j rule
Post: RE: Combinator attack not recognizing -j rule

fixed in latest beta -- thanks!
atom Old oclHashcat Support 4 7,718 04-01-2015, 04:14 PM
    Thread: Generate NUM random rules
Post: RE: Generate NUM random rules

You can not save the generated rule with -g But there's a standalone utility that does exactly the same in hashcat-utils: Quote: -- root@et:~/hashcat-utils-1.2# ./generate-rules.bin 2 $, s...
atom Old oclHashcat Support 11 13,639 04-03-2015, 11:54 PM
    Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?

That's an interessting question. Thing is, we dropped native permutation attack from oclHashcat a while back. But even then it was not really an option becuase there was no way to add a separator char...
atom Old oclHashcat Support 30 45,031 04-05-2015, 09:00 PM
    Thread: Brute-force TrueCrypt non-system partition
Post: RE: Brute-force TrueCrypt non-system partition

yeah, part of every modern linux basic installation
atom Old oclHashcat Support 3 6,590 04-05-2015, 09:01 PM
    Thread: 6 x 7990's using ASUS BTC mining motherboard WPA2
Post: RE: 6 x 7990's using ASUS BTC mining motherboard W...

In this case, (h)ashes per second is the same as keys per second. 4x7990 = 8x7970 ~ 1,12 Mh/s For a keyspace of 00000000 - 99999999 this means it would take 90 seconds. Note that the 7990 is ...
atom Hardware 5 10,453 04-05-2015, 09:05 PM
    Thread: [HELP] Read russian,arabic, chinese,ecc.. from a wordlist
Post: RE: [HELP] Read russian,arabic, chinese,ecc.. from...

then you need to guess, try all encodings
atom Old oclHashcat Support 4 8,309 04-05-2015, 11:31 PM
    Thread: Help with a specific mask or rule
Post: RE: Help with a specific mask or rule

indeed and with tmesis.pl from hashcat-utils you can let auto-generate them for you
atom Old oclHashcat Support 6 9,413 04-05-2015, 11:32 PM
    Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?

Well if you stick to mask-attack the maximum is 55, so I really think you want to do that
atom Old oclHashcat Support 30 45,031 04-05-2015, 11:35 PM
    Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Maximum length of 31? Why?

If you use -a 3 (mask-attack) it will work because the limit with mask attack is 55. Quote: -- root@et:~/oclHashcat-1.36# ./oclHashcat64.bin -m 100 hash '8|7|9|4|2|10|6|11|12|1|0|5|13|3|14' -a 3...
atom Old oclHashcat Support 30 45,031 04-05-2015, 11:37 PM
    Thread: Bottleneck, and my 31 character limit. Ideas?
Post: RE: Formatted/mask permutations?

OK, here's the solution: ## ## generate base ## Quote: -- $ cat perm-input.txt 0123456789 -- Quote: -- $ /root/hashcat-utils-1.2/permute.bin < perm-input.txt | more 0123456789 1023456789 2013...
atom Old oclHashcat Support 30 45,031 04-06-2015, 03:15 AM
    Thread: HMAC-SHA1 mask
Post: RE: HMAC-SHA1 mask

You were pretty close, just the message is to long (max. 32) and you need to quote differently: Quote: -- $ echo -n "This is a long salt" | openssl dgst -sha1 -hmac "key" ...
atom General Help 3 12,983 04-06-2015, 05:29 PM