Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Known password construction
Post: RE: Known password construction

Unless you're dealing with a very slow hash, that level of processing would be a waste of time on GPU, especially when using rules. Filter it the best you can inbound, and then use rules to permute wh...
royce hashcat 7 4,564 04-01-2018, 12:58 AM
    Thread: Newbee Question about Requirements(RESOLVED)
Post: RE: Newbee Question about Requirements

You need OpenCL. Download and install what the hashcat.net/hashcat/ page suggests for your platform. The reason why should be easily Google-able, but in a nutshell, it's a unified language for writing...
royce hashcat 2 2,302 04-05-2018, 06:06 AM
    Thread: Two sessions writing to the same potfile
Post: RE: Two sessions writing to the same potfile

Use the source, Luke. :) If you look at locking.c and potfile.c in the source code, it appears that (as long as you're not on Windows), some basic locking of the potfile is happening. That being...
royce hashcat 6 4,965 04-07-2018, 05:26 AM
    Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!

That format has more fields, separated by asterisks, than your hash. If you try your attack against this example hash from hashcat wiki has more fields: $itunes_backup$*10*8b715f516ff8e64442c478...
royce hashcat 3 11,612 04-13-2018, 04:48 PM
    Thread: Separator Unmatched! Please help!
Post: RE: Separator Unmatched! Please help!

Does your attack work against the example hash? If so, the problem is probably your hash. Double-check to ensure that the field count is identical.
royce hashcat 3 11,612 04-14-2018, 05:13 AM
    Thread: Hi guys
Post: RE: Hi guys

Do a little more research into how to make images that compress well. It's quite feasible to make images that are very small. This avatar is only 3K: https://gravatar.com/avatar/f720786ef4b2ff5b4b...
royce hashcat 18 12,096 04-14-2018, 04:15 PM
    Thread: MD5 With salt how to save only cracked hash with email etc
Post: RE: MD5 With salt how to save only cracked hash wi...

Scripting. There's no canned way to do this. You could group your other data into an overloaded username field, and then use --username.
royce hashcat 4 3,079 04-14-2018, 06:47 PM
    Thread: Hashcat & OpenCL... Why OpenCL?
Post: RE: Hashcat & OpenCL... Why OpenCL?

OpenCL is the framework that hashcat uses to perform the computation on the selected hardware. Without an OpenCL driver for a given hardware platform, you cannot use modern hashcat on that hardware...
royce hashcat 2 2,373 04-21-2018, 07:19 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

[heh, yeah - what philsmd said. :) ] Are you getting an error, by any chance? I think if you use --hex-charset, hashcat expects the other literals in the mask to either also be hex or else to be ...
royce hashcat 16 9,677 04-22-2018, 07:34 AM
    Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...

I encourage you to calculate how much of a difference in total keyspace this would make - and how long your attack will take even if these duplicates were removed. Here is a value that might be hel...
royce hashcat 6 4,323 04-22-2018, 07:51 PM
    Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...

Yep, that looks right to me. I need to upgrade napkins. :)
royce hashcat 6 4,323 04-22-2018, 08:55 PM
    Thread: Cache path
Post: RE: Cache path

This message happens at a different stage from the dictionary metadata analysis. This message is related to the overall space needed to execute the attack. It is not clear from your question what kind...
royce hashcat 2 2,038 04-22-2018, 09:42 PM
    Thread: Rule for omitting duplicates in bruteforce attack?
Post: RE: Rule for omitting duplicates in bruteforce att...

Generally speaking, there's no efficient way to eliminate duplicates within hashcat itself. You'd have to write an external candidate-password generator, and pipe that into hashcat.
royce hashcat 6 4,323 04-23-2018, 04:35 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

Regardless of attack, -m 0 is unsalted and -m 20 is salted. If this concept isn't familiar, search a bit for "password" and "salting".
royce hashcat 16 9,677 04-25-2018, 07:28 AM
    Thread: HashCat takes a very long time to report progress
Post: RE: HashCat takes a very long time to report progr...

Have you tried manually setting the status update frequency (with --status and --status-timer)? [Edit: apparently this issue is regardless of that; could be a potential feature, likely a GitHub iss...
royce hashcat 5 8,314 04-26-2018, 06:59 AM
    Thread: please add PuTTY private key cracker ! thx
Post: RE: please add PuTTY private key cracker ! thx

Have you considered atom's suggestion above?
royce hashcat 3 6,345 04-26-2018, 07:01 AM
    Thread: Can anyone help me
Post: RE: Can anyone help me

Usually, the only reason people try alternate OpenCL is because drivers from AMD/NVIDIA are not available. If so, there's not a lot that hashcat can do for you - you should heed the disclaimers at ...
royce hashcat 3 3,116 04-27-2018, 06:16 PM
    Thread: Veracrypt Kuznyechik(Serpent(Camellia))
Post: RE: Veracrypt Kuznyechik(Serpent(Camellia))

I don't believe this algorithm is current supported. You might consider requesting it on the hashcat GitHub.
royce hashcat 2 2,629 04-30-2018, 05:09 PM
    Thread: pass:hash output for every candidate
Post: RE: pass:hash output for every candidate

I'm not aware of a way to get hashcat to output *all* candidates - only the actual cracks. What is your use case for this?
royce hashcat 5 3,431 05-02-2018, 04:08 AM
    Thread: pocl benchmarks
Post: RE: pocl benchmarks

Wow - that is quite interesting - thanks for the stats, hops. Promising for the future - and useful even today for people with specific attack needs.
royce hashcat 1 2,405 05-02-2018, 04:36 PM