Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: MD5 Help
Post: RE: MD5 Help

Do you mean that the plaintext is 32 characters? If so, then unless you have a strong idea of its composition, bruteforce cannot reach even half of that keyspace.
royce hashcat 4 1,653 10-21-2019, 06:20 AM
    Thread: My amd gpu hashcat -b -m 17200 can't get the benchmark, the page can't perform hash o
Post: RE: My amd gpu hashcat -b -m 17200 can't get the b...

Thanks for masking the hash! Could you provide the full commandline you're using, and the output that you get (continuing to mask any hashes)?
royce hashcat 2 1,343 10-21-2019, 04:18 AM
    Thread: New - What am I missing?
Post: RE: New - What am I missing?

Can you post the full output - full command line, and the results? This is what a successful run (but unsuccessful crack) looks like ('hashcat') happens to not be in RockYou: Code: -- $ hashcat -m...
royce hashcat 8 2,368 10-12-2019, 04:56 PM
    Thread: Migrating Brain Server Data
Post: RE: Migrating Brain Server Data

Fair question. So far, I don't think that any interface-breaking changes have happened, so no migration steps have been necessary. If/when it becomes necessary, the migration will vary, based on wh...
royce hashcat 8 2,469 10-12-2019, 08:44 AM
    Thread: Graphic card or cloud computing
Post: RE: Graphic card or cloud computing

This depends on your use case. If you have a one-time cracking job that will only take a few hours or days, then the cloud makes more sense. If you intend to have longer-running jobs, or multipl...
royce hashcat 3 1,503 10-11-2019, 07:34 AM
    Thread: Running into issues with max mask length
Post: RE: Running into issues with max mask length

I honestly haven't tried this before, but instead of trying to load it all into a mask, you might also be able to just do a hybrid attack (mask + wordlist), where the wordlist is just one line with yo...
royce hashcat 6 2,040 10-09-2019, 06:06 PM
    Thread: Should I be using a rule instead?
Post: RE: Should I be using a rule instead?

Good point! True for this particular case, but not the more general case. :P ;)
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 3 1,925 09-25-2019, 10:42 PM
    Thread: Should I be using a rule instead?
Post: RE: Should I be using a rule instead?

There's no way for a single mask to express optional characters (that I'm aware of). But if you pass a file containing the masks, they are processed in succession very quickly.
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 3 1,925 09-25-2019, 06:21 PM
    Thread: unknown hash type
Post: RE: unknown hash type

https://hashcat.net/forum/archive/index.php?announcement-2.html
royce hashcat 2 1,062 09-25-2019, 03:42 AM
    Thread: [PrinceProcessor] Trying to change --pw-max
Post: RE: [PrinceProcessor] Trying to change --pw-max

Yeah, the startup time is non-trivial for sure. A big value of PRINCE is in keeping "state" about which words appear most frequently (based on their order in the original wordlist). So if that's not i...
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 3 2,080 09-22-2019, 08:05 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

Yes - the one I first posted. ;) Study how custom character set works, and replace sequences like this: ?l?l?l?l?l?l?l?l ?u?l?l?l?l?l?l?l ?d?l?l?l?l?l?l?l ... with: -1 ?l?u?d ?1?l?l?l?l?...
royce hashcat 11 2,905 09-22-2019, 06:40 PM
    Thread: [PrinceProcessor] Trying to change --pw-max
Post: RE: [PrinceProcessor] Trying to change --pw-max

Modify the source. Code: -- --- pp.c-dist 2019-01-14 21:33:46.443328919 -0900 +++ pp.c 2019-09-22 07:25:16.660698312 -0800 @@ -27,9 +27,9 @@ #define IN_LEN_MIN 1 #define IN_LEN_MAX ...
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 3 2,080 09-22-2019, 05:17 PM
    Thread: Unknown Hashes
Post: RE: Unknown Hashes

https://hashcat.net/forum/archive/index.php?announcement-2.html
royce General Talk 2 11,344 09-22-2019, 07:34 AM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

No utility necessary - honest. :D Study the default, understand how it works, and then adapt it to your needs. :D
royce hashcat 11 2,905 09-21-2019, 07:15 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max.
royce hashcat 11 2,905 09-21-2019, 06:50 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified. It defaults to this mask: -1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d
royce hashcat 11 2,905 09-21-2019, 06:42 PM
    Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack

Because masks are executed on GPU, it's probably much faster to just run it as a hybrid (-a 6) or mask attack.
royce hashcat 4 1,995 09-08-2019, 03:43 AM
    Thread: Best strategy for keyword attack
Post: RE: Best strategy for keyword attack

So you know the base word, and you need to append some a special and two numbers? -r ./rules/hybrid/append_s.rule -r ./rules/hybrid/append_d.rule -r -r ./rules/hybrid/append_d.rule
royce hashcat 4 1,995 09-08-2019, 02:09 AM
    Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...

And if it needs to be more than two words wide, you can do something crude like this: https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2
royce hashcat 3 1,426 09-04-2019, 02:41 PM
    Thread: I need a very detailed picture and text tutorial, I don't have any foundation.
Post: RE: I need a very detailed picture and text tutori...

https://www.google.com/search?q=hashcat+%28novice+OR+beginner%29+%28tutorial+OR+howto%29 ... yields: https://laconicwolf.com/2018/09/29/hashcat-tutorial-the-basics-of-cracking-passwords-with-has...
royce hashcat 4 1,877 09-02-2019, 04:37 PM