Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...

For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often.
Incisive Old oclHashcat Support 9 34,152 07-22-2014, 05:25 AM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...

It's still using the 0x200 identifier; I just double-checked.
Incisive General Talk 3 9,884 04-07-2014, 04:23 AM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...

If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes. The archived thread on SQL Server 2012 hashes is at: https://hashcat.net/foru...
Incisive General Talk 3 9,884 04-04-2014, 04:12 PM
    Thread: Workstation GPU support (NVIDIA Quadro, ATI FirePro)
Post: Workstation GPU support (NVIDIA Quadro, ATI FirePr...

I realize it's suboptimal, but work password auditing must be done on work supplied hardware, unfortunately - compliance with corporate standards trumps speed. As long as I can get similar or faster ...
Incisive Hardware 0 4,512 02-20-2014, 07:42 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 18,271 01-27-2014, 06:12 AM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 18,271 01-24-2014, 10:08 PM
    Thread: Creating a secure hash?
Post: RE: Creating a secure hash?

As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT. For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u...
Incisive General Talk 6 12,451 01-24-2014, 09:50 PM
    Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)

First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI! I'd like to suggest that once you're happy with the ...
Incisive General Talk 10 25,565 10-10-2013, 05:28 AM
    Thread: Why closed source?
Post: RE: Why closed source?

Personally, I would like to thank Atom and all the other contributors to Hashcat for continuing to offer it to the security community for free. That, in and of itself, is both very generous, and very...
Incisive General Talk 29 65,448 10-10-2013, 05:04 AM
    Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos

You can use Code: -- --outfile=Myfile.out --outfile-format=5 -- instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's...
Incisive General Talk 8 14,731 05-03-2013, 04:26 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th...
Incisive Very old oclHashcat-plus Support 4 8,930 04-19-2013, 12:32 PM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Mem5 Wrote: (04-19-2013, 07:51 AM) -- Ok, I'll open a TRAC. Thank you for your help. Curious question : how can somebody login into a system using a password with the null byte character ? As it i...
Incisive General Help 15 33,297 04-19-2013, 12:02 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ...
Incisive Very old oclHashcat-plus Support 4 8,930 04-18-2013, 04:30 AM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

First, let me say that this has been a great discussion, and I'd like to thank Atom for the choice to branch out into some of the more interesting formats that aren't pure hashes! Second, regarding...
Incisive Very old oclHashcat-plus Support 44 362,018 04-18-2013, 04:28 AM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...

I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes. Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,...
Incisive Very old oclHashcat-plus Support 4 8,930 04-17-2013, 05:10 AM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

jpgoldberg Wrote: (04-17-2013, 02:44 AM) -- Remember that unlike the passwords that 1Password saves for people, the Master Password has to be memorable and typable by humans. If one uses a diceware p...
Incisive Very old oclHashcat-plus Support 44 362,018 04-17-2013, 04:58 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Awesome job, philsmd!!! Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:...
Incisive General Help 15 33,297 04-15-2013, 06:12 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe...
Incisive General Help 15 33,297 04-14-2013, 05:37 AM
    Thread: Markov stats questions
Post: Markov stats questions

First, thank you for implementing Markov mode - even the default oclhashcat-plus 0.14 implementation gets may more hits in the first part of the keyspace than in the last. I have a few questions ab...
Incisive hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 1 7,491 04-10-2013, 03:33 PM
    Thread: status from gpu cracking?
Post: RE: status from gpu cracking?

First, you may be confusing the "lite" version with the "plus" version. lite is designed to operate on a single hash, fed in on the command line. plus is designed to operate on a file of hashes. He...
Incisive Very old oclHashcat-plus Support 8 18,263 04-05-2013, 01:10 AM