Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: On-the-fly loading of gz wordlists
Post: RE: On-the-fly loading of gz wordlists

Yes, that seems right. It would have to decompress the whole thing first, enough to analyze the statistics and then cache them. so I assume there would be some duplicated work, just like dictionary ca...
royce hashcat 6 1,379 05-25-2020, 10:28 PM
    Thread: Separating words in combinator attack with space
Post: RE: Separating words in combinator attack with spa...

And if it needs to be more than two words wide, you can do something crude like this: https://gist.github.com/roycewilliams/18e3fb14b97cc05eb95a5645692bccc2
royce hashcat 3 1,428 09-04-2019, 02:41 PM
    Thread: Hashing Linux Passwords
Post: RE: Hashing Linux Passwords

hashcat can't parse the entire /etc/shadow format with all fields. hashcat expects either a list of raw hashes (or, when using --username, user:hash pairs) Just trim off the first two fields (cu...
royce hashcat 3 1,447 10-30-2019, 03:22 PM
    Thread: Crack pbkdf2
Post: RE: Crack pbkdf2

Please see the forum rules. Posting hashes is not allowed. I have redacted your hash. https://hashcat.net/forum/archive/index.php?announcement-2.html There are a number of tutorials showing basi...
royce hashcat 7 1,452 03-29-2020, 04:33 AM
    Thread: Most Efficient KeePass Path of Mix Dictionary and characters
Post: RE: Most Efficient KeePass Path of Mix Dictionary ...

Not much to optimize here; you're the person best positioned to guess what your own password was. SLI is irrelevant (and even contraindicated; I'd remove it and let hashcat manage the GPUs directly). ...
royce hashcat 1 1,488 11-10-2018, 07:45 AM
    Thread: Little sugdestion
Post: RE: Little sugdestion

https://hashcat.net/wiki/doku.php?id=mask_attack ? Specifically, a list of multiple masks, generated with policygen from the PACK toolkit or similar.
royce hashcat 1 1,493 09-02-2018, 09:50 PM
    Thread: Graphic card or cloud computing
Post: RE: Graphic card or cloud computing

This depends on your use case. If you have a one-time cracking job that will only take a few hours or days, then the cloud makes more sense. If you intend to have longer-running jobs, or multipl...
royce hashcat 3 1,505 10-11-2019, 07:34 AM
    Thread: Installing CL_OUT_OF_RESOURCES patch
Post: RE: Installing CL_OUT_OF_RESOURCES patch

The instructions on the wiki page are very clear - create a .reg file with the specified contents, then run it as Administrator and reboot. That last part is Google-able.
royce hashcat 1 1,507 12-11-2018, 05:59 AM
    Thread: Need a new hardware to run Hashcat?
Post: RE: Need a new hardware to run Hashcat?

If your card is still supported by latest stable AMD drivers, it should be supported by hashcat.
royce hashcat 4 1,509 12-19-2019, 09:27 AM
    Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)

Crunch is unnecessary for most attacks: * Limiting duplicate characters is not worth the sacrifice in speed * Resumption of candidate generation is built in natively to hashcat Generating candi...
royce General Talk 4 1,523 05-20-2020, 05:19 AM
    Thread: CrunchCat (Crunch + HashCat)
Post: RE: CrunchCat (Crunch + HashCat)

If your target password is likely less than the max supported by an optimized kernel, adding "-O" to your command line will be significantly faster. This max value varies from hashtype to hashtype - c...
royce General Talk 4 1,523 05-20-2020, 04:55 PM
    Thread: Hashcat self-destructs (Windows)
Post: RE: Hashcat self-destructs (Windows)

Ah, so it was previously running, and then it got overwritten somehow? My first instinct is to say that it's almost certainly due to either a non-hashcat-supplied script with a bug in it, or some o...
royce hashcat 2 1,558 04-06-2019, 05:09 PM
    Thread: What makes cracking faster for a given algorithm
Post: RE: What makes cracking faster for a given algorit...

The answer should be intuitive. Some algorithms are literally much 'faster' than others. If the hash wasn't really designed for cracking-resistant password storage - such as MD5 - then it's quite fas...
royce General Talk 1 1,563 02-11-2019, 03:05 AM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

By default, hashcat doesn't start from 'aaaaa' - instead, it starts with sets of characters that appear most frequently in common passwords, called Markov mode. For example, if you try '?d?d?d?d?d', i...
royce hashcat 9 1,575 04-26-2020, 02:42 AM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

One use case I can think of is when you intend to bruteforce an entire keyspace, and want to "meet in the middle" by having one system work forwards, and the other system work backwards. This would wo...
royce hashcat 9 1,575 04-26-2020, 03:33 PM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

Well, my point was that if you could just start a run from the other end, you wouldn't have to calculate keyspace at all (for the case of two attack systems)
royce hashcat 9 1,575 04-26-2020, 04:02 PM
    Thread: Bruteforce with descending characters - zzz,zzy,zzx
Post: RE: Bruteforce with descending characters - zzz,zz...

From the PM, it looks like you'd benefit from doing what philsmd described - using the 'skip' and 'limit' options to split the job across two nodes. philsmd, I'm actually not aware of a simple tutori...
royce hashcat 9 1,575 04-26-2020, 04:48 PM
    Thread: [split] hashcat v4.1.0
Post: RE: hashcat v4.1.0

Rangletrap, please read the forum rules: https://hashcat.net/forum/archive/index.php?announcement-2.html * Do not post hashes * Do not ask people to crack your hashes * Do not hijack threads (...
royce hashcat 1 1,577 05-17-2018, 06:07 PM
    Thread: Help with specific password scheme
Post: RE: Help with specific password scheme

A hybrid attack might be fine. If you generate the wordlist on the fly, no need to store it anywhere. I'd do it with everything but the first four digits prepended and then pipe the output of that scr...
royce hashcat 3 1,589 04-01-2019, 04:48 PM
    Thread: Help with specific password scheme
Post: RE: Help with specific password scheme

The rules would probably have to stop there, because the number of combinations would probably go up pretty quickly - adding three specials to the previous calculation would be 600K rules x (35^3) wou...
royce hashcat 3 1,589 04-02-2019, 04:06 AM