Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: Passwords14 - Presentation slides
Post: RE: Passwords14 - Presentation slides

Cool, thanks! Note that due to some directory reorganization, this is now at https://hashcat.net/events/p14-vegas/
royce Organisation and Events 1 6,108 11-19-2017, 03:37 AM
    Thread: Contact & dump list manager
Post: RE: Contact & dump list manager

For future searchers, this thread is relevant: https://hashcat.net/forum/thread-6796.html
royce General Talk 1 5,146 11-19-2017, 03:46 AM
    Thread: Just a small bench of OSX 10.8+ hash
Post: RE: Just a small bench of OSX 10.8+ hash

Yes, that looks good! What version of hashcat was that? (Please include hashcat version information in future benchmarks, for historical purposes). Here's an updated benchmark: Code: -- $ has...
royce Hardware 1 3,207 11-19-2017, 03:58 AM
    Thread: maskprocessor to output in HEX?
Post: RE: maskprocessor to output in HEX?

Not sure if this matches your use case, but FWIW, hops suggested this workaround: Code: -- $ ./mp64.bin -1 ?dabcdef '$HEX[?1?1]' $HEX[00] $HEX[01] $HEX[02] $HEX[03] $HEX[04] $HEX[05] $HEX...
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 5,357 11-25-2017, 10:34 PM
    Thread: Sql server 2014 hashes
Post: RE: Sql server 2014 hashes

You mean something like this? Code: -- SELECT password_hash    FROM sys.sql_logins -- More info here: https://www.sqlservercentral.com/articles/password+cracking/96540/
royce General Talk 1 3,132 11-29-2017, 05:23 AM
    Thread: 3des, k1==k3, k1 != k2 kernel
Post: RE: 3des, k1==k3, k1 != k2 kernel

As a general reference for other searchers: * My understanding is that k1 != k2 != k3 is feasible because of meet-in-the-middle (https://crypto.stackexchange.com/questions/6345). * See also this...
royce hashcat 1 2,519 11-29-2017, 05:31 AM
    Thread: complex md5 salted hash
Post: RE: complex md5 salted hash

Yes, if I understand you correctly - if you're only attacking a single salt, then appending a hyphen to the end of the salt would have the same effect.
royce hashcat 1 2,516 11-30-2017, 04:57 AM
    Thread: Rockyou hcmask files
Post: RE: Rockyou hcmask files

I believe that they're derived from an expected runtime (based on a baseline cracking rate): The first number is a way to keep them sorted, and the second number is the number of seconds. Code: --...
royce hashcat 1 2,578 12-10-2017, 09:16 PM
    Thread: Intel Nuc Opencl and Gpu issue
Post: RE: Intel Nuc Opencl and Gpu issue

This is a problem with Intel's OpenCL runtime. The hashcat project cannot fix it.
royce hashcat 1 3,209 12-20-2017, 04:55 PM
    Thread: What am I doing wrong?
Post: RE: What am I doing wrong?

I'm not able to reproduce this. Code: -- $ hashcat -a 3 --stdout -i --increment-min 5 --increment-max 9 -1 custom.hcchr -2 custom1.hcchr ?u?1?1?1?2?2?2?2?2 | head -100000 | cut -b1 | sort -u | ...
royce hashcat 1 1,843 12-23-2017, 04:19 AM
    Thread: Trying to understand RLI and RLI2 better
Post: RE: Trying to understand RLI and RLI2 better

The purpose of rli is to diff two lists, and only show the new ones in the new file. It's not a dedupe tool. For general dedupe, sort -u is your go-to for this. I use this alias (adjust parameters to...
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 2,745 12-25-2017, 08:57 PM
    Thread: Rule stacking
Post: RE: Rule stacking

There's only one way to find out ;) Code: -- $ cat rule1.list u $ cat rule2.list d $ cat rule1-colon.list : u $ cat rule2-colon.list : d $ cat list.txt password 123456 $ cat list.txt | hash...
royce hashcat 1 2,043 12-25-2017, 06:28 PM
    Thread: New
Post: RE: New

Wiping a hard drive for reuse doesn't usually involve having to provide a password. Unless you're trying to revive drives that were wiped with ATA Secure Erase and have a security password set on ...
royce hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 2,683 01-12-2018, 05:37 AM
    Thread: VeraCrypt Volume Won't Decrypt. I know password and keyfile?
Post: RE: VeraCrypt Volume Won't Decrypt. I know passwor...

Approach should be identical to TrueCrypt - extracting the first bytes of the drive into a separate file, and pointing hashcat at it. https://hashcat.net/forum/thread-7099.html
royce hashcat 1 2,375 01-19-2018, 08:32 AM
    Thread: Enpass password recovery supported?
Post: RE: Enpass password recovery supported?

If it's the same kind of hash as described here: https://github.com/hashcat/hashcat/issues/600 ... then it's not currently supported by hashcat - neither CPU nor GPU. Sounds like JtR is proba...
royce hashcat 1 1,961 02-03-2018, 06:41 PM
    Thread: mask attack issue
Post: RE: mask attack issue

Have you tried --status and --status-timer ?
royce hashcat 1 1,771 02-05-2018, 07:06 AM
    Thread: Bruteforce + Custom characters
Post: RE: Bruteforce + Custom characters

If the first 8 characters are truly unknown, then the first 8 positions of the mask would be ?a, and the rest would be literal / hard-coded: ?a?a?a?a?a?a?a?aAlis-ZA
royce hashcat 1 1,855 02-17-2018, 06:27 PM
    Thread: What does the values in Speed Dev indicate
Post: RE: What does the values in Speed Dev indicate

The first device is hashing candidate passwords at a rate of roughly 9452700 hashes per second.
royce hashcat 1 1,825 02-17-2018, 06:28 PM
    Thread: Status Exhausted???
Post: RE: Status Exhausted???

Probably a good idea not to post hashes that you care about. Looking at the end, this looks like a normal run to me, in which all candidates were tried, but none were successful. Code: -- Ses...
royce hashcat 1 2,011 03-01-2018, 05:32 PM
    Thread: Pause Certain Devices
Post: RE: Pause Certain Devices

There's no interactive native way to do this today. You could work around this by scripting something that does the following: 1. Stop the job. 2. Modify the restore file using https://github.c...
royce hashcat 1 1,671 03-31-2018, 03:45 AM