Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Veracrypt with keyfile
Post: RE: Veracrypt with keyfile

Sounds like it's a passphrase, and you know the wordlist, but not the order. princeprocessor could be used to generate all possible combinations of words. You may need to alter princeprocessor's so...
royce hashcat 2 1,630 02-25-2019, 07:20 PM
    Thread: Wordlist massive attack
Post: RE: Wordlist massive attack

You can assemble the passphrases from a one-word-per-line wordlist, using princeprocessor, and then pipe it to hashcat, using one of the prince_*.rule rules files to supply more work to the GPUs.
royce hashcat 3 2,583 03-01-2019, 07:14 AM
    Thread: Can I use Hashcat for checking against HIBP DB?
Post: RE: Can I use Hashcat for checking against HIBP DB...

Well, theoretically, you could download the HIBP SHA-1 hashes from https://haveibeenpwned.com/Passwords, and then crack them with hashcat using your list as a wordlist. But since the HIBP list is so l...
royce hashcat 4 3,071 03-10-2019, 06:30 PM
    Thread: iClass request
Post: RE: iClass request

https://www.cs.bham.ac.uk/~garciaf/publications/dismantling.iClass.pdf
royce hashcat 4 2,577 03-16-2019, 01:38 AM
    Thread: Separator unmatched when using example hash
Post: RE: Separator unmatched when using example hash

Hashes containing '$' need to be enclosed in single quotes on the Unix commandline. This is because $[string] is a way to do variable substitution in bash and related shells. Once you fix that, you ...
royce hashcat 2 8,713 03-16-2019, 08:10 PM
    Thread: hashcat do not work android linux ?
Post: RE: hashcat do not work android linux ?

There appears to be no OpenCL on this platform. OpenCL is required.
royce hashcat 2 1,739 03-31-2019, 05:10 PM
    Thread: Help with specific password scheme
Post: RE: Help with specific password scheme

A hybrid attack might be fine. If you generate the wordlist on the fly, no need to store it anywhere. I'd do it with everything but the first four digits prepended and then pipe the output of that scr...
royce hashcat 3 1,591 04-01-2019, 04:48 PM
    Thread: Help with specific password scheme
Post: RE: Help with specific password scheme

The rules would probably have to stop there, because the number of combinations would probably go up pretty quickly - adding three specials to the previous calculation would be 600K rules x (35^3) wou...
royce hashcat 3 1,591 04-02-2019, 04:06 AM
    Thread: Hashcat self-destructs (Windows)
Post: RE: Hashcat self-destructs (Windows)

Ah, so it was previously running, and then it got overwritten somehow? My first instinct is to say that it's almost certainly due to either a non-hashcat-supplied script with a bug in it, or some o...
royce hashcat 2 1,561 04-06-2019, 05:09 PM
    Thread: RTX 2080 Low performance
Post: RE: RTX 2080 Low performance

The kernel building is a once-per-algorithm-per-hashcat-version thing, and will only slow you down on the first run.
royce hashcat 7 3,929 04-08-2019, 10:14 PM
    Thread: Where's potfile?
Post: RE: Where's potfile?

~/.hashcat/
royce hashcat 7 2,992 04-10-2019, 04:51 PM
    Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt

There's no way to suppress these errors with a hashcat flag. --force certainly doesn't do that.
royce hashcat 5 2,706 05-01-2019, 06:04 PM
    Thread: Alternatives to HashcatGUI?
Post: RE: Alternatives to HashcatGUI?

Big fan of Hashtopolis.
royce hashcat 4 1,994 07-06-2019, 08:31 PM
    Thread: Host memory required for this attack: 64 MB
Post: RE: Host memory required for this attack: 64 MB

Did the attack work? I think it's informative - not an error?
royce hashcat 1 1,191 07-16-2019, 04:01 PM
    Thread: Kerberoasting-Attack / NTLM Hash cracking
Post: RE: Kerberoasting-Attack / NTLM Hash cracking

If you know for a fact that it's *truly* 12 random characters... then it's not crackable in a reasonable amount of time. If you do the math: https://www.wolframalpha.com/input/?i=(26%2B26%2B34)...
royce hashcat 5 3,976 08-04-2019, 08:12 PM
    Thread: Password cracking guidance
Post: RE: Password cracking guidance

The magic word you're missing is "LUKS". This should yield a few reasonable howtos: https://www.google.com/search?q=LUKS+hashcat
royce hashcat 1 1,241 08-06-2019, 05:05 AM
    Thread: I'm using Windows - where does combinator.exe write out to?
Post: RE: I'm using Windows - where does combinator.exe ...

The canonical way to do this is simply pipe the output of combinator to hashcat itself, so you don't have to store the result anywhere. combinator list1 list2 | hashcat ...
royce hashcat 2 1,064 08-14-2019, 02:35 AM
    Thread: scrypt hash format
Post: RE: scrypt hash format

Example method - script by atom. Code: -- #!/usr/bin/perl use strict; use warnings; use MIME::Base64; while (my $line = ) { chomp $line; my @data = split '\$', $line; if ($data[5] ne 64) ...
royce hashcat 2 1,189 08-14-2019, 04:15 PM
    Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...

There's no single mask. You have to generate a *list of masks*. You can do this with policygen from the PACK toolkit. https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-...
royce hashcat 2 1,220 08-18-2019, 06:24 PM
    Thread: How to install hxcdumptool manually?
Post: RE: How to install hxcdumptool manually?

There's no install - you just download it by whatever means you can, and then transfer it to where you need to run it, and then compile+run.
royce hashcat 7 2,463 08-25-2019, 02:28 AM