Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Password limit of 16 chars - md5crypt
Post: RE: Password limit of 16 chars - md5crypt

You know how high chances are you find passwords of length 16 and more?
atom Old hashcat Support 5 13,683 11-26-2012, 11:18 AM
    Thread: Password length issues
Post: RE: Password length issues

Not supported as this would require two sha256 transform calls
atom Old hashcat Support 5 8,316 10-23-2014, 10:27 AM
    Thread: Password in hidden truecrypt file not found...
Post: RE: Password in hidden truecrypt file not found...

For -hidden- TC volumes you need to skip the first 64k of data, read here how to do it: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_do_i_extract_the_hashes_from_truecrypt_vo...
atom Old oclHashcat Support 2 5,150 12-30-2015, 03:49 PM
    Thread: Password generation from HDD
Post: RE: Password generation from HDD

I never thought about creating a wordlist this way. In theory you should be able to do "strings /dev/sda", that should work and if there's hidden data you should get it with this as well...
atom General Help 3 8,290 02-13-2014, 07:58 PM
    Thread: Password Decoration Rule
Post: RE: Password Decoration Rule

Thanks for this share! Actually cracked some of my uncrackable hashes list :)
atom User Contributions 24 54,401 06-08-2012, 10:16 AM
    Thread: Password Decoration Rule
Post: RE: Password Decoration Rule

If you want them in the distribution, no problem. But they should be somehow different to the ones that already included. Otherwise it would make no sense.
atom User Contributions 24 54,401 06-08-2012, 11:25 AM
    Thread: Password Decoration Rule
Post: RE: Password Decoration Rule

Thats fine, oclHashcat limits the maximum number of functions per rule
atom User Contributions 24 54,401 01-25-2013, 12:00 PM
    Thread: Password Decoration Rule
Post: RE: Password Decoration Rule

No plans for that, actually its not possible because of some hard limitations from GPU
atom User Contributions 24 54,401 01-25-2013, 01:19 PM
    Thread: Password Decoration Rule
Post: RE: Password Decoration Rule

Yes that fine @ Wiki There will be no problem @ hashcat pipe. There is also no such limit for slow hashes in oclHashcat-plus, thats only for fast hashes (different rule engine).
atom User Contributions 24 54,401 01-25-2013, 02:25 PM
    Thread: Password Analyzer by TrAnn3l
Post: RE: Password Analyzer by TrAnn3l

Thanks!
atom User Contributions 1 8,076 11-11-2013, 04:30 PM
    Thread: Passphrase help
Post: RE: Passphrase help

Hashcat itself does not support the generation of "passphrases", but supports reading from stdin. What you need to find a tool to generate passphrases and then pipe the output to hashcat.
atom hashcat 2 3,365 12-07-2016, 07:35 PM
    Thread: Partially known password + md5 hash + trouble cracking
Post: RE: Partially known password + md5 hash + trouble ...

a third alternative is using a fifo, but this works on linux only.
atom General Help 5 17,248 01-28-2012, 10:16 AM
    Thread: Partial-Hash
Post: RE: Partial-Hash

I think you are searching for a program to collide (collision) a hash. Hashcat is not made for this.
atom General Help 1 5,692 11-05-2012, 01:05 PM
    Thread: parsing restore file
Post: RE: parsing restore file

note that the restore structure changes massively with v1.20. also see this: https://hashcat.net/forum/thread-3047.html
atom Old oclHashcat Support 6 10,397 04-15-2014, 06:13 PM
    Thread: parsing restore file
Post: RE: parsing restore file

oclHashcat v1.20 has a new parameter that will help you integrating called --status-automat that you can simply read from stdout
atom Old oclHashcat Support 6 10,397 04-16-2014, 08:25 AM
    Thread: Parsing multipe wpa handshake from a merged cap file.
Post: RE: Parsing multipe wpa handshake from a merged ca...

Can aircrack read the extract.cap (the one output by tshark) without using the -J? If not, I'd say tshark destroyed it, at least for using it with aircrack
atom General Help 4 16,628 01-09-2015, 11:52 AM
    Thread: Parsing multipe wpa handshake from a merged cap file.
Post: RE: Parsing multipe wpa handshake from a merged ca...

In that case don't use the combination of tshark + aircrack for convert. You can use cap2hccap I think it has an builtin filter.
atom General Help 4 16,628 01-09-2015, 04:59 PM
    Thread: Parse Database
Post: RE: Parse Database

The hashcat way to do this is using --show: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpas...
atom General Talk 8 8,950 01-27-2017, 11:54 PM
    Thread: Parameters for passwords
Post: RE: Parameters for passwords

If you use -a 6 hybrid attack that means you have a mask. The mask will add N length to the candidates, depending on your mask. Means if you subtract that length from your maximum password length, all...
atom hashcat 1 3,213 08-19-2016, 09:20 AM
    Thread: Packages for Linux distributions
Post: RE: Packages for Linux distributions

Yes, that's correct. I just wanted to start the discussion. I think what we need is a list of paths we'd need to change to make it more compatible. Btw. this _maybe_ has influence on the windows p...
atom hashcat 12 18,959 12-08-2015, 01:01 AM