Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: CPU vs GPU
Post: RE: CPU vs GPU

GPU is usually better. There's no way to use more memory at the hashcat level. Some background on the 25% memory cap is here (https://devtalk.nvidia.com/default/topic/992502/cuda-programming-and-per...
royce hashcat 21 44,484 02-26-2017, 08:11 AM
    Thread: CPU vs GPU
Post: RE: CPU vs GPU

I don't know a lot about Mac hardware, but I would assume that this is because the GPU in that unit is slower than the CPU? In my experience, the GPU is usually better, though, so someone else may kno...
royce hashcat 21 44,484 02-26-2017, 08:37 AM
    Thread: CPU vs GPU
Post: RE: CPU vs GPU

That definitely works. Orient yourself with your command line. Code: -- $ hashcat -b -m 0 hashcat (v3.30-317-g778f568) starting in benchmark mode... OpenCL Platform #1: NVIDIA Corporation ===...
royce hashcat 21 44,484 02-26-2017, 05:58 PM
    Thread: CPU vs GPU
Post: RE: CPU vs GPU

Also note that the "maximum power" you mentioned early is memory size, which has no relationship to speed.
royce hashcat 21 44,484 02-26-2017, 06:00 PM
    Thread: CPU vs GPU
Post: RE: CPU vs GPU

In the posted benchmarks, your GPU performance is roughly an order of magnitude better than your CPU performance.
royce hashcat 21 44,484 02-26-2017, 08:32 PM
    Thread: CPU vs GPU
Post: RE: CPU vs GPU

You said your CPU was better than your GPU. This is not correct. Your GPU is much better. How much RAM you're using only matters when using large lists of rules, etc.
royce hashcat 21 44,484 02-27-2017, 02:58 AM
    Thread: Crack a long list efficiently
Post: RE: Crack a long list efficiently

Of course hashcat does this - even if there are different salts. Anything else would be bizarre.
royce hashcat 10 11,854 08-13-2016, 04:29 PM
    Thread: Crack pbkdf2
Post: RE: Crack pbkdf2

Please see the forum rules. Posting hashes is not allowed. I have redacted your hash. https://hashcat.net/forum/archive/index.php?announcement-2.html There are a number of tutorials showing basi...
royce hashcat 7 1,454 03-29-2020, 04:33 AM
    Thread: Cracking a Truecrypt Container
Post: RE: Cracking a Truecrypt Container

That's hashcat mode 6223 (where 3 = "all" (all three algorithms)): Code: --   62XY | TrueCrypt                                        | Full-Disk Encryption (FDE) ...   �...
royce hashcat 2 3,013 01-27-2019, 10:30 PM
    Thread: Cracking descrypt
Post: RE: Cracking descrypt

Here's one for ZTEX -- source code, but no bitstream. https://github.com/Gifts/descrypt-ztex-bruteforcer
royce General Help 3 7,718 11-08-2015, 08:54 AM
    Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters

This Stackexchange thread may be informative - it has some examples: https://security.stackexchange.com/questions/154901/attack-wpa-password-with-hashcat-settings-and-resources-for-german-passwords/1...
royce hashcat 4 3,252 01-29-2019, 03:09 AM
    Thread: Cracking foreign words/characters
Post: RE: Cracking foreign words/characters

It's often better to encode the custom charsets in the mask file itself, because it's persistent documentation of the nature of the attack that lives beyond that particular commandline.
royce hashcat 4 3,252 01-30-2019, 05:12 PM
    Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)

There is nothing unusual about the 2012-era LinkedIn SHA1 hashes - they're generic raw SHA1. There is only one version of hashcat now - does OpenCL or CUDA (but at least one is required, for either...
royce hashcat 7 873 08-10-2020, 05:45 PM
    Thread: Cracking SHA1(linkedin)
Post: RE: Cracking SHA1(linkedin)

Lol -and apparently I used to know this (2017) ... and totally forgot! Thanks, philsmd!
royce hashcat 7 873 08-10-2020, 08:45 PM
    Thread: Cracking Turkish/Foreign Hashes
Post: RE: Cracking Turkish/Foreign Hashes

What MD5 is your Python producing? I get: Code: -- $ echo -n 'ĞĞ' | md5sum 411019a0840fad007398bcab6cc9188c  - -- ... which hashcat cracks, using your syntax: Code: -- $ hashcat --...
royce hashcat 2 2,374 05-21-2018, 12:41 AM
    Thread: Create custom dictionary
Post: RE: Create custom dictionary

Welcome! Instead of generating a custom dictionary, you're looking for a hybrid or rules-based attack, I think. With these attacks, each word in your dictionary is dynamically modified many times,�...
royce hashcat 8 13,923 04-25-2017, 03:02 PM
    Thread: Create custom dictionary
Post: RE: Create custom dictionary

Good question, jallis. devilman666, since the order is always the same, the example that I provided should apply to your case.
royce hashcat 8 13,923 04-25-2017, 03:46 PM
    Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)

Crunch is unnecessary for most attacks: * Limiting duplicate characters is not worth the sacrifice in speed * Resumption of candidate generation is built in natively to hashcat Generating candi...
royce General Talk 4 1,523 05-20-2020, 05:19 AM
    Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)

If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - c...
royce General Talk 4 1,523 05-20-2020, 04:55 PM
    Thread: csv output for benchmarking
Post: RE: csv output for benchmarking

There is also: hashcat -b --machine-readable
royce User Contributions 1 3,940 02-19-2017, 03:45 AM