Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...

TL, Dr. ;) To summarize: you are cracking an iTunes backup (probably the newer -m 14800, >= 10.0 version) on a single GTX 970, and you're looking for better options. On the spectrum of dictionar...
royce hashcat 8 5,899 05-30-2018, 04:11 AM
    Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...

You might first try a dictionary like rockyou.txt, which has a number of common passwords, in case it was something simple. After that, there are some decent howtos out there for growing your hashc...
royce hashcat 8 5,899 05-30-2018, 04:35 AM
    Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...

Hey, can you explain a bit more about what you meant by "input problems" with the device? Is it possible that the password might be something like one of your suspected passwords, but with letters mis...
royce hashcat 8 5,899 05-30-2018, 05:00 AM
    Thread: First year of medical school notes encrypted; begging for help
Post: RE: First year of medical school notes encrypted; ...

Self-interest is the sauce of self-motivated learning. ;) Glad there was a happy ending to this one - congratulations!
royce hashcat 8 5,899 06-06-2018, 04:03 PM
    Thread: First Cracking Rig
Post: RE: First Cracking Rig

I hadn't seen that case before - interesting form factor. If you intend to run long jobs, make sure that your cooling of the room itself is adequate. I haven't done the math, but 2x1600 PSUs seems ...
royce Hardware 19 10,139 02-19-2019, 05:29 PM
    Thread: First Cracking Rig
Post: RE: First Cracking Rig

Since mining has dropped off a bit, you can probably pick up some of the higher-end multi-PCIe boards for pretty cheap. Some examples: https://bitcoin.zorinaq.com/many_pcie/ Some attacks are happier ...
royce Hardware 19 10,139 02-19-2019, 05:49 PM
    Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash

I don't know of a way to do this with hashcat today. But the "jumbo" edition of John the Ripper has a "hidden" option (--keep-guessing) that will do this. For CRC32, the source file has to be asse...
royce hashcat 9 12,023 09-11-2016, 06:43 AM
    Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash

When using masks, hashcat uses the same sequence of passwords every time. I haven't read your script thoroughly, but how does the script teach hashcat that it shouldn't just stop at the first one it ...
royce hashcat 9 12,023 09-11-2016, 03:55 PM
    Thread: Finding all the collisions for a given hash
Post: RE: Finding all the collisions for a given hash

Ah, you're using the offset - nice!
royce hashcat 9 12,023 09-11-2016, 04:39 PM
    Thread: Finding Algo/Hash Type
Post: RE: Finding Algo/Hash Type

It's not open source, but it's free to use. Note also that I've removed the hashes from your post - posting full hashes with non-known plains is against the forum rules.
royce hashcat 3 2,624 11-10-2018, 01:39 AM
    Thread: Finding Algo/Hash Type
Post: RE: Finding Algo/Hash Type

In general, the only way to tell for sure is to crack one. Other tools like MDXfind are good at tackling many different algos at once against a pile of unknown hashes. hashcat and MDXfind have some...
royce hashcat 3 2,624 11-09-2018, 11:05 PM
    Thread: find missing characters from my private key
Post: RE: find missing characters from my private key

If there are 32 random characters missing, there is no way to bruteforce that space in our lifetimes.
royce hashcat 5 4,355 05-31-2018, 06:24 PM
    Thread: Fibonacci rules?
Post: RE: Fibonacci rules?

I would expect that a general hybrid attack (that tries a variety of number combinations, not just Fibonacci) would almost always be the way to go here. Unless maybe it was A) a very slow hash, and B)...
royce User Contributions 1 5,011 11-19-2017, 03:30 AM
    Thread: Few wordlist processing utilities
Post: RE: Few wordlist processing utilities

Cool - especially the mutators, thanks! (The others are mostly covered by tools in hashcat-utils and/or PACK, I think)
royce User Contributions 1 5,099 11-19-2017, 03:36 AM
    Thread: fast method for merging cracked hashes with original data
Post: RE: fast method for merging cracked hashes with or...

This shouldn't be particularly slow - how slow are we talking?
royce General Talk 1 2,400 11-19-2017, 02:54 AM
    Thread: Fan control in Linux
Post: RE: Fan control in Linux

Hey, did you ever find out a good solution for this for you?
royce Hardware 2 3,930 11-19-2017, 03:27 AM
    Thread: False Positives
Post: RE: False Positives

Depends on what you mean by "false positive". :) For some hash types, hashcat will automatically show all collisions that it discovers. (You can also get this behavior for other hash types with --k...
royce hashcat 3 658 06-16-2020, 04:03 PM
    Thread: Extracting Hashes
Post: RE: Extracting Hashes

This varies depending on the hash type. But generally, the John the Ripper tools are usually quite good - and up to date for many hash types.
royce General Talk 1 1,866 06-19-2018, 08:04 AM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

That's exactly what hashcat does when using attack mode 3 (brute force, -a 3), and a mask is not specified. It defaults to this mask: -1 ?l?d?u -2 ?l?d -3 ?l?d*!$@_ ?1?2?2?2?2?2?2?3?3?3?3?d?d?d?d
royce hashcat 11 2,910 09-21-2019, 06:42 PM
    Thread: Exploiting the human factor
Post: RE: Exploiting the human factor

Yes, by default if you specify no other parameters other than -a 3, it will automatically increment until exhaustion. IF you want it to terminate earlier, you'd have to specify an --increment-max.
royce hashcat 11 2,910 09-21-2019, 06:50 PM