Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Mask not finding password Straight hit or miss.
Post: RE: Mask not finding password Straight hit or miss...

Are you having to use --force? Can you please post the actual full commands you're using?
royce hashcat 20 5,249 11-17-2019, 12:43 AM
    Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking

With the upcoming -S / --slow-candidates option, it may be that a better approach for this could be possible.
royce hashcat 19 9,934 09-03-2018, 04:27 AM
    Thread: NTLM vs WPA/WPA2 cracking
Post: RE: NTLM vs WPA/WPA2 cracking

Fair. I'm a little over my head here, but it does sound as though the length enforcement is happening in the wrong place for slow hashes.
royce hashcat 19 9,934 09-03-2018, 04:39 PM
    Thread: First Cracking Rig
Post: RE: First Cracking Rig

I hadn't seen that case before - interesting form factor. If you intend to run long jobs, make sure that your cooling of the room itself is adequate. I haven't done the math, but 2x1600 PSUs seems ...
royce Hardware 19 10,136 02-19-2019, 05:29 PM
    Thread: First Cracking Rig
Post: RE: First Cracking Rig

Since mining has dropped off a bit, you can probably pick up some of the higher-end multi-PCIe boards for pretty cheap. Some examples: https://bitcoin.zorinaq.com/many_pcie/ Some attacks are happier ...
royce Hardware 19 10,136 02-19-2019, 05:49 PM
    Thread: Nvidia 3080 benchmarks
Post: RE: Nvidia 3080 benchmarks

Watch @Chick3nman512 on Twitter - he'll likely be posting some in the next day or two.
royce Hardware 19 4,598 09-16-2020, 08:04 PM
    Thread: Hi guys
Post: RE: Hi guys

Do a little more research into how to make images that compress well. It's quite feasible to make images that are very small. This avatar is only 3K: https://gravatar.com/avatar/f720786ef4b2ff5b4b...
royce hashcat 18 12,095 04-14-2018, 04:15 PM
    Thread: Reversing MSCHAPv2 to NTLM
Post: RE: Reversing MSCHAPv2 to NTLM

Nice catch/answer, undeath
royce User Contributions 18 36,654 05-12-2018, 07:18 PM
    Thread: blowfish brute
Post: RE: blowfish brute

Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil...
royce hashcat 17 24,505 08-31-2016, 11:22 PM
    Thread: blowfish brute
Post: RE: blowfish brute

An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt. Can you post the full command line you're using?
royce hashcat 17 24,505 09-01-2016, 01:23 AM
    Thread: bitcoin mining vs password cracking?
Post: RE: bitcoin mining vs password cracking?

You're probably better off just running a benchmark for your specific setup, or using tools like https://whattomine.com/
royce General Talk 17 18,837 10-03-2017, 07:50 PM
    Thread: Bitslice status and broken nvcc
Post: RE: Bitslice status and broken nvcc

Can the source be reduced to a minimal test case, suitable for sharing with the nvcc team?
royce General Talk 16 25,328 10-25-2015, 07:40 AM
    Thread: New Cracking Build Feedback
Post: RE: New Cracking Build Feedback

I'd recommend something other than K a l i for the main OS. It doesn't play well with OpenCL and hashcat sometimes.
royce Hardware 16 14,432 12-06-2017, 09:24 PM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

[heh, yeah - what philsmd said. :) ] Are you getting an error, by any chance? I think if you use --hex-charset, hashcat expects the other literals in the mask to either also be hex or else to be ...
royce hashcat 16 9,670 04-22-2018, 07:34 AM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

Regardless of attack, -m 0 is unsalted and -m 20 is salted. If this concept isn't familiar, search a bit for "password" and "salting".
royce hashcat 16 9,670 04-25-2018, 07:28 AM
    Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help

cryptozin, please don't hijack threads. If you have a different question, please start a new thread.
royce hashcat 16 9,774 05-12-2018, 03:56 PM
    Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help

Not much to go on to help you here. Please also note that you're not 'decrypting' - there is no 'reversing' or 'decrypting' of true hashes. Hashes are not encryption. When you're trying to crack a...
royce hashcat 16 9,774 05-13-2018, 04:00 AM
    Thread: [ANSWERED] New user, custom brute force help
Post: RE: [ANSWERED] New user, custom brute force help

Yep, that happens automatically - state is saved periodically to a restore file, and you use --restore to restore.
royce hashcat 16 9,774 05-14-2018, 12:59 AM
    Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself

For more on the scope and impact of keyspace, see https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_keyspace Also, atom: can you speak to what keyspace is actually intend...
royce hashcat 15 20,287 11-24-2017, 02:55 AM
    Thread: Do not try to write --keyspace yourself
Post: RE: Do not try to write --keyspace yourself

*lightbulb* Ahhhh ... so they only need to be "proportional" within specific attack type/combos, and that's why they can't be compared across them! Because it's *called* a keyspace ... but it isn't...
royce hashcat 15 20,287 11-24-2017, 11:00 AM