Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?

You could use mp64 to generate them, maybe? https://hashcat.net/wiki/doku.php?id=rules_with_maskprocessor Might still have to dedupe it a little after, depending
royce hashcat 10 965 08-31-2020, 11:53 PM
    Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?

Dedupe of text on the command line is a largely solved problem. Depends on your platform. 'sort -u' on Unix-likes covers most use cases. On Windows, 'sort.exe /unique' seems roughly equivalent.
royce hashcat 10 965 09-01-2020, 04:10 AM
    Thread: combine rules without duplicates?
Post: RE: combine rules without duplicates?

There's also this project, that tries to detect rules with redundant results: https://github.com/0xbsec/duprule/
royce hashcat 10 965 09-01-2020, 05:04 PM
    Thread: Ubuntu 14.04 Hashcat command?
Post: RE: Ubuntu 14.04 Hashcat command?

Prepend "./" (because the current directory isn't in your path by default in Linux) and use the executable for your platform (cudaHashcat64.bin or the 32-bit equivalent).
royce Old hashcat Support 11 16,491 11-16-2015, 02:40 AM
    Thread: long mask issue
Post: RE: long mask issue

If you really think that your target plaintext is 32 digits long, you will need more information about digit placement and likelihood to have any hope of cracking it. To answer the literal part of yo...
royce hashcat 11 12,841 02-11-2017, 11:54 PM
    Thread: long mask issue
Post: RE: long mask issue

Ah, and to be precise even further ... it would never exhaust, because it's not controlled.
royce hashcat 11 12,841 02-12-2017, 05:14 AM
    Thread: long mask issue
Post: RE: long mask issue

devilsadvocate Wrote: (02-12-2017, 05:44 AM) -- Generating random input to hashcat has its uses despite what you may think. -- Only in the same sense that a starving man might find it "useful" to wa...
royce hashcat 11 12,841 02-12-2017, 06:28 AM
    Thread: long mask issue
Post: RE: long mask issue

Your target ... is randomly generated ... and changes every 30 seconds? o_O The chances of you getting "lucky" are: (45Gh/s * 30) / 10^32 ≈ 1 in 7.407×10^19 ... or roughly 1 chance in 7,407,407...
royce hashcat 11 12,841 02-12-2017, 09:44 PM
    Thread: long mask issue
Post: RE: long mask issue

devilsadvocate Wrote: (02-12-2017, 02:33 AM) -- royce Wrote: (02-11-2017, 11:54 PM) -- If you really think that your target plaintext is 32 digits long, you will need more information about digit pl...
royce hashcat 11 12,841 02-12-2017, 05:04 AM
    Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...

I can't speak to CPU (other than "generally faster is better" and "at least one core per GPU") or RAM (other than "more than 32GB for analyzing big wordlists"). For density (packing a good amount of ...
royce Hardware 11 13,250 03-27-2017, 09:33 PM
    Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...

More cores is good. Current state of the art is NVIDIA (because of the LOPT3.LUT instruction set, I think?)
royce Hardware 11 13,250 03-30-2017, 06:14 PM
    Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...

It is definitely supported by hashcat. Some benchmarks from @epixoip are here: https://gist.github.com/epixoip/973da7352f4cc005746c627527e4d073
royce Hardware 11 13,250 04-01-2017, 12:01 AM
    Thread: What GPU and CPU is ideal for Penetration testing role job?
Post: RE: What GPU and CPU is ideal for Penetration test...

PCI-E lanes are good for gaming, but hashcat does not care. x1 would even be sufficient for hashcat. If you intend to use the system for multiple password-auditing purposes, a minimum of x4 might ...
royce Hardware 11 13,250 04-03-2017, 07:24 PM
    Thread: hashcat v4.0.0
Post: RE: hashcat v4.0.0

A *lot* of work behind the scenes to make longer passwords possible. Thank you, atom! (And don't forget: if you don't need longer passwords, always remember to add -O now!) Selected benchmarks (...
royce hashcat 11 86,633 10-27-2017, 05:43 PM
    Thread: hashcat v4.0.0
Post: RE: hashcat v4.0.0

Fair question - though it's also the case that existing rules will now produce results that wouldn't have worked before. In other words, if you run your existing rules and lists against your unfoun...
royce hashcat 11 86,633 11-20-2017, 06:28 PM
    Thread: 3DES Is there a problem? where did I go wrong ?
Post: RE: 3DES Is there a problem? where did I go wrong ...

No. Do the math (seriously, as in do the actual calculation of multiplying hashes per second by the number of hashes, using something like Wolfram Alpha) so that you understand why it's literally impo...
royce hashcat 11 6,630 11-11-2018, 03:32 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified. It defaults to this mask: -1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d
royce hashcat 11 2,908 09-21-2019, 06:42 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max.
royce hashcat 11 2,908 09-21-2019, 06:50 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

No utility necessary - honest. :D Study the default, understand how it works, and then adapt it to your needs. :D
royce hashcat 11 2,908 09-21-2019, 07:15 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

Yes - the one I first posted. ;) Study how custom character set works, and replace sequences like this: ?l?l?l?l?l?l?l?l ?u?l?l?l?l?l?l?l ?d?l?l?l?l?l?l?l ... with: -1 ?l?u?d ?1?l?l?l?l?...
royce hashcat 11 2,908 09-22-2019, 06:40 PM