Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Multiple masks - repeated sequences
Post: RE: Multiple masks - repeated sequences

Do the math of how many combinations it will actually save you, compared to the total number of combinations. It's rarely worth the effort to eliminate the relatively small number of duplicates lik...
royce hashcat 2 625 05-19-2020, 10:01 PM
    Thread: Brute-Force mask
Post: RE: Brute-Force mask

There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit: https://github.com/iphelix/pack/...
royce hashcat 4 1,108 05-20-2020, 04:04 AM
    Thread: Apply Rule In Between Dictionary Words
Post: RE: Apply Rule In Between Dictionary Words

You have a couple of indirect options: 1. Generate the .###. list externally with a script, and then use combinator3 to pipe that combined with your other wordlists hashcat. That will be OK for slo...
royce hashcat 1 485 05-15-2020, 05:36 AM
    Thread: Brute-Force custom character
Post: RE: Brute-Force custom character

Following up from your other deleted post, in which you said there are exactly 8 upper and 5 digits. There are probably too many combinations to reasonably exhaust, but to model how many masks woul...
royce hashcat 2 792 05-20-2020, 04:07 AM
    Thread: Brute-Force mask
Post: RE: Brute-Force mask

Yep. That's what will take 49 years. :)
royce hashcat 4 1,108 05-20-2020, 10:35 AM
    Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists

WFM: Code: -- $ hashcat --version v5.1.0-1789-gc7da6357 $ file rockyou.txt.gz rockyou.txt.gz: gzip compressed data, was "rockyou.txt", last modified: Thu Jul 7 14:27:39 2016, from Unix $ wc -l r...
royce hashcat 6 1,379 05-23-2020, 07:31 PM
    Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists

I'm not sure, but I think that decompressed data can be used "on the fly" - as soon as it's decompressed, without having to wait for the entire file to decompress.
royce hashcat 6 1,379 05-24-2020, 03:48 PM
    Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists

Yes, that seems right. It would have to decompress the whole thing first, enough to analyze the statistics and then cache them. so I assume there would be some duplicated work, just like dictionary ca...
royce hashcat 6 1,379 05-25-2020, 10:28 PM
    Thread: Make a word list with hashcat
Post: RE: Make a word list with hashcat

To clarify, do you mean that each word is 62 characters long, and only consisting of the letters '1', '3', 'e', and 'f' ? If so, this wordlist would be infeasible to exhaust. https://www.wolfram...
royce hashcat 3 910 05-26-2020, 04:29 PM
    Thread: Missing characters from hashcat brute-force?
Post: RE: Missing characters from hashcat brute-force?

Yes, the default incremental mode is not a full brute force, but rather one that is optimized for likely candidates without being exhaustive: Guess.Mask.......: ?1?2?2?2?2?2?2?3 [8] Guess.Charset....
royce hashcat 2 705 05-26-2020, 08:16 PM
    Thread: Improved Mask Attack
Post: RE: Improved Mask Attack

Look at the custom character set parameters (-1 / -2 / -3 / -4)
royce hashcat 2 705 05-28-2020, 11:42 PM
    Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256

There's no online calculator that I'm aware of. Just do the math: 1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450...
royce hashcat 6 1,263 05-29-2020, 05:50 PM
    Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256

Because of the definition of ?a, as shown in hashcat --help: Code: -- - [ Built-in Charsets ] - ? | Charset ===+========= l | abcdefghijklmnopqrstuvwxyz u | ABCDEFGHIJKLMNOPQRSTUVWX...
royce hashcat 6 1,263 05-29-2020, 08:30 PM
    Thread: Hashcat don't use my GPU or my GPU are bottleneck
Post: RE: Hashcat don't use my GPU or my GPU are bottlen...

Wordlist-only attacks (without additional work like rules or hybrid masks) cannot reach full benchmark speeds, because not enough work (candidate words) can be supplied to keep up with the speed of th...
royce hashcat 2 735 06-05-2020, 03:56 AM
    Thread: Make a word list with hashcat
Post: RE: Make a word list with hashcat

It is not possible with 100,000 graphics cards. I encourage you to do the mathematical calculation yourself: - Test how many hashes per second are possible on your system - Calculate how many poss...
royce hashcat 3 910 05-26-2020, 08:45 PM
    Thread: how to use algo new
Post: RE: how to use algo new

If you mean one of these, hashcat supports it: * MySQL5 - hashcat mode -m 300 * sha1(sha1(pass)) - hashcat mode -m 4500
royce hashcat 1 610 06-05-2020, 03:34 PM
    Thread: htacces crack
Post: RE: htacces crack

I've redacted your hash. Please read the forum rules: https://hashcat.net/forum/archive/index.php?announcement-2.html To identify hashes, check against the hashcat example hashes: https://has...
royce hashcat 1 466 06-14-2020, 07:04 PM
    Thread: DES with partial plain text
Post: RE: DES with partial plain text

Could you elaborate with a hypothetical/contrived example? It sounds like you *might* be looking for masks. For example, if you know that a password is 10 characters and the first four characters a...
royce hashcat 11 1,633 06-14-2020, 10:36 PM
    Thread: hashcat -b is not seeing my grahpic card
Post: RE: hashcat -b is not seeing my grahpic card

FWIW, under Ubuntu 18.04 I'm also able to run hashcat well using the native packages. I have these installed: Code: -- $ dpkg -l | grep nvidia | egrep -v '^ii' | cut -b1-80 rcĀ  libnvidia-compu...
royce hashcat 4 892 06-15-2020, 05:21 PM
    Thread: Modify the hash file and continue the attack at the same point
Post: RE: Modify the hash file and continue the attack a...

I'm not aware of a way to do this. But wouldn't this mean that all of your previous attack wouldn't ever be applied to the new hash?
royce hashcat 3 662 06-22-2020, 08:31 PM