Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: I have error please help me
Post: RE: I have error please help me

Yep, you can't do that. It looks like you're trying to do a combinator attack. There's a direct combinator attack (which is -a 1), or there is a way to simulate a selectes subset of combinator effect...
royce hashcat 3 1,264 12-15-2019, 11:10 PM
    Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256

There's no online calculator that I'm aware of. Just do the math: 1. Calculate how many possibilities your mask will generate. For example, ?a has 95 possibilities, so ?a?a?a?a is 95^4 or 81450...
royce hashcat 6 1,263 05-29-2020, 05:50 PM
    Thread: How long to decrypt SHA256
Post: RE: How long to decrypt SHA256

Because of the definition of ?a, as shown in hashcat --help: Code: -- - [ Built-in Charsets ] - ? | Charset ===+========= l | abcdefghijklmnopqrstuvwxyz u | ABCDEFGHIJKLMNOPQRSTUVWX...
royce hashcat 6 1,263 05-29-2020, 08:30 PM
    Thread: Use whole RAM Colab
Post: RE: Use whole RAM Colab

Have you analyzed what resource is the bottleneck? Just a guess, but it's probably not RAM.
royce hashcat 7 1,257 05-03-2020, 11:26 PM
    Thread: Rule Question
Post: RE: Rule Question

Fair question. If the rule file contains the "do nothing" rule directive ( : - just a colon by itself), then the original unmodified input words will be used.
royce hashcat 3 1,245 08-26-2019, 03:50 PM
    Thread: Password cracking guidance
Post: RE: Password cracking guidance

The magic word you're missing is "LUKS". This should yield a few reasonable howtos: https://www.google.com/search?q=LUKS+hashcat
royce hashcat 1 1,238 08-06-2019, 05:05 AM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

Please post your command line, with any sensitive info replaced with generic info
royce hashcat 14 1,236 09-08-2020, 06:00 AM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

If you delete the empty potfile, is it recreated on the next run?
royce hashcat 14 1,236 09-09-2020, 03:09 AM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

@philsmd, I can recreate this - for both TrueCrypt and Veracrypt, it seems, if a session is specified, but a potfile is not, then ses.potfile is not created on the fly that I can find (on Linux, anywa...
royce hashcat 14 1,236 09-21-2020, 11:16 PM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

Huh - when I did my veracrypt testing in late 2018, it used the filename. This seems like the approach that would cause the least amount of confusion. Otherwise, we'll have a steady stream of users as...
royce hashcat 14 1,236 09-24-2020, 07:47 PM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

I've also opened an issue to explore improvements here: https://github.com/hashcat/hashcat/issues/2554
royce hashcat 14 1,236 09-25-2020, 03:52 AM
    Thread: Custom mask - brute force 12 length passwords with 1 capital letter, 1 number
Post: RE: Custom mask - brute force 12 length passwords ...

There's no single mask. You have to generate a *list of masks*. You can do this with policygen from the PACK toolkit. https://security.stackexchange.com/questions/158956/bruteforce-with-hashcat-...
royce hashcat 2 1,220 08-18-2019, 06:24 PM
    Thread: personal wrapper script that got out of hand, 'hashcrack'
Post: RE: personal wrapper script that got out of hand, ...

Interesting - thanks for the contribution!
royce User Contributions 1 1,217 01-07-2020, 12:10 AM
    Thread: Host memory required for this attack: 64 MB
Post: RE: Host memory required for this attack: 64 MB

Did the attack work? I think it's informative - not an error?
royce hashcat 1 1,189 07-16-2019, 04:01 PM
    Thread: scrypt hash format
Post: RE: scrypt hash format

Example method - script by atom. Code: -- #!/usr/bin/perl use strict; use warnings; use MIME::Base64; while (my $line = ) { chomp $line; my @data = split '\$', $line; if ($data[5] ne 64) ...
royce hashcat 2 1,187 08-14-2019, 04:15 PM
    Thread: change working directory
Post: RE: change working directory

In the future, you can also use https://github.com/philsmd/analyze_hc_restore, written by a core hashcat developer. You can rewrite a restore file, changing various config items.
royce hashcat 3 1,133 12-16-2019, 11:43 PM
    Thread: Juniper netscreen hash help
Post: RE: Juniper netscreen hash help

does the attack work against the Netscreen example hash from the hashcat wiki (https://hashcat.net/wiki/doku.php?id=example_hashes)? nNxKL2rOEkbBc9BFLsVGG6OtOUO/8n:user
royce hashcat 2 1,124 12-11-2019, 06:15 AM
    Thread: Brute-Force mask
Post: RE: Brute-Force mask

There are probably too many combinations to reasonably exhaust, but to model how many masks would be needed, you can use the `policygen` tool from the PACK toolkit: https://github.com/iphelix/pack/...
royce hashcat 4 1,108 05-20-2020, 04:04 AM
    Thread: Brute-Force mask
Post: RE: Brute-Force mask

Yep. That's what will take 49 years. :)
royce hashcat 4 1,108 05-20-2020, 10:35 AM
    Thread: SHA256 (AuthMe)
Post: RE: SHA256 (AuthMe)

This type is present in the beta version, not yet released. https://hashcat.net/beta/ Or you can wait until the release.
royce hashcat 2 1,085 01-25-2020, 07:35 PM