Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

From the PM, it looks like you'd benefit from doing what philsmd described - using the 'skip' and 'limit' options to split the job across two nodes. philsmd, I'm actually not aware of a simple tutori...
royce hashcat 9 1,576 04-26-2020, 04:48 PM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

To fully take advantage of GPU for a fast hash like MD5, you have to have more than a few rules. You might try emulating a hybrid attack with generated rules. https://hashcat.net/wiki/doku.php?i...
royce hashcat 14 14,530 11-22-2017, 04:50 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

Yeah, like I said in my edit - it doesn't work like I was hoping it would. I don't have a better answer yet. But notice that what I was trying to do - generate some of the word on GPU with a large ...
royce hashcat 14 14,530 11-22-2017, 05:32 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

OK, this is ugly as heck, and buggy (it doesn't fully emulate bruteforce for the last two characters), but it's getting close: Code: -- $ for item in `mp64 '?aTEMP?a'`; do echo "di6${item}iE${it...
royce hashcat 14 14,530 11-22-2017, 06:20 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

I'm guessing ... but if I had to say, it's probably that in practice, most attacks are possible without it (by chaining stuff together, Unix-style) - so adding it internally could (arguably) add unnec...
royce hashcat 14 14,530 11-22-2017, 05:43 PM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

Man, I thought I tried that and it didn't work. But I checked and it was failing for other syntax reasons. So: Code: -- $ cat double.rule d $ mp64 '$?a$?a' >append-aa.rule $ head appen...
royce hashcat 14 14,530 11-22-2017, 08:33 PM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

You might try increasing the number of masks, to see if that improves performance. But generally speaking, I suspect that full bruteforce has some attack-specific optimizations that make it pretty ...
royce hashcat 14 14,530 11-23-2017, 06:18 AM
    Thread: Bruteforce + Custom characters
Post: RE: Bruteforce + Custom characters

If the first 8 characters are truly unknown, then the first 8 positions of the mask would be ?a, and the rest would be literal / hard-coded: ?a?a?a?a?a?a?a?aAlis-ZA
royce hashcat 1 1,857 02-17-2018, 06:27 PM
    Thread: Brute-Force mask
Post: RE: Brute-Force mask

There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit: https://github.com/iphelix/pack/...
royce hashcat 4 1,108 05-20-2020, 04:04 AM
    Thread: Brute-Force mask
Post: RE: Brute-Force mask

Yep. That's what will take 49 years. :)
royce hashcat 4 1,108 05-20-2020, 10:35 AM
    Thread: Brute-Force custom character
Post: RE: Brute-Force custom character

Following up from your other deleted post, in which you said there are exactly 8 upper and 5 digits. There are probably too many combinations to reasonably exhaust, but to model how many masks woul...
royce hashcat 2 792 05-20-2020, 04:07 AM
    Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...

And if you need it before it's added to hashcat, you'll have to fall back to other tools. John the Ripper supports it with a dynamic mode (CPU only): Code: -- Format label ...
royce hashcat 8 6,868 02-17-2018, 07:21 PM
    Thread: Brute Force- Mask,ntml hash?
Post: RE: Brute Force- Mask,ntml hash?

There is no way to determine the length of a plaintext from the hash. This is true for all hashes, and is by design. You cannot know the length until you have cracked it. You can use other informat...
royce hashcat 1 2,734 10-05-2016, 05:40 PM
    Thread: Brain working slow!!!
Post: RE: Brain working slow!!!

Yes, especially with fast hashes like MD5, a slow Internet connection definitely makes a difference. I speak from Alaskan experience. :) You might switch to only using --brain-client-features=2, so...
royce General Talk 4 3,280 11-10-2018, 11:48 PM
    Thread: Brain behavior
Post: RE: Brain behavior

The target hashlist does have to be file-checksum-level identical, IIRC. But I'm not positive. But it also shouldn't be very hard to create a very simple test case to verify it directly.
royce hashcat 4 2,815 12-08-2018, 03:41 AM
    Thread: Brain as a centralized potfile?
Post: RE: Brain as a centralized potfile?

1. Yes. All candidates are centrally reported and indexed. For slow hashes, this is effective, because it allows all clients to skip those candidates. For fast hashes, this will quickly bottleneck the...
royce hashcat 3 2,094 12-16-2018, 10:28 PM
    Thread: blowfish brute
Post: RE: blowfish brute

Just as descrypt (-m 1500) is based on DES (but is much more, because it adds rounds/stretching/etc.), and md5crypt (-m 500) is similarly derived from MD5, it is the bcrypt hash (-m 3200) that is buil...
royce hashcat 17 24,506 08-31-2016, 11:22 PM
    Thread: blowfish brute
Post: RE: blowfish brute

An artificial hash is fine. The $2a$ format is indeed blowfish-based bcrypt. Can you post the full command line you're using?
royce hashcat 17 24,506 09-01-2016, 01:23 AM
    Thread: BLAKE2
Post: RE: BLAKE2

259.4 MH/s on my 750 Ti. ;) (That's with -O and -w 4.)
royce hashcat 4 3,133 11-11-2018, 03:38 PM
    Thread: Bitslice status and broken nvcc
Post: RE: Bitslice status and broken nvcc

Can the source be reduced to a minimal test case, suitable for sharing with the nvcc team?
royce General Talk 16 25,329 10-25-2015, 07:40 AM