Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th...
Incisive Very old oclHashcat-plus Support 4 8,933 04-19-2013, 12:32 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...

I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes. Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,...
Incisive Very old oclHashcat-plus Support 4 8,933 04-17-2013, 05:10 AM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 18,277 01-24-2014, 10:08 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 18,277 01-27-2014, 06:12 AM
    Thread: oclHashcat-plus v0.06 - add support for md5($pass.$salt)
Post: RE: oclHashcat-plus v0.06 - add support for md5($p...

Could this be alleviated instead by a documentation change? for instance: md5($pass.$salt): Joomla vX1 to vY1+, App2 vX2 to vY2+, App3 vX3 to vY3+. This is a single md5 hash of the password and s...
Incisive Very old oclHashcat-plus Support 5 12,828 12-20-2011, 04:49 PM
    Thread: hashcat-gui v0.5.0
Post: RE: hashcat-gui v0.5.0

Thank you very much for continuing to update the GUI! I've found it exceedingly helpful, both to actually run the hashcat programs easily, and to generate the command lines for later regression tests...
Incisive Very old hashcat-GUI Announcements 5 36,817 01-16-2012, 05:34 PM
    Thread: AES/Rijndael expert needed
Post: RE: AES/Rijndael expert needed

gat3way Wrote: (06-04-2012, 03:06 PM) -- Much better idea would be to use a key derivation function like PBKDF2 with ïnitial symmetric key as salt with some good iterations count. Applying the pas...
Incisive Feature Requests 5 14,079 06-07-2012, 07:10 AM
    Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?

Finding blank passwords is indeed a feature, and a very important and welcome one! Not finding any other hashes, however, is a bug :(.
Incisive Old hashcat Support 5 8,980 09-27-2012, 05:05 PM
    Thread: SIP (MD5)
Post: RE: SIP (MD5)

It looks like SIP has at least two places that use MD5 digest: One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password). The other place is duri...
Incisive Feature Requests 5 31,780 08-31-2012, 09:13 PM
    Thread: Hashcat 0.41 mode 1731 fails?
Post: Hashcat 0.41 mode 1731 fails?

On hashcat 0.41 I'm not getting successful results (except with an apparent blank password) with -m 1731 on either your example hashes or even my own tests. Intel Core i7-2600 Code: -- hashca...
Incisive Old hashcat Support 5 8,980 09-26-2012, 05:40 PM
    Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...

To be fair, PBKDF2(HMAC-SHA1, pw, salt, 1000, 256) is absolutely much better than the previous SHA1(pw, salt). Completely insufficent and quite silly, but still better than we had. PBKDF2(HMAC-SHA-3...
Incisive Feature Requests 6 30,198 12-12-2012, 09:30 PM
    Thread: Creating a secure hash?
Post: RE: Creating a secure hash?

As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT. For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u...
Incisive General Talk 6 12,456 01-24-2014, 09:50 PM
    Thread: oclHashcat-plus: resume after shutdown
Post: RE: oclHashcat-plus: resume after shutdown

Would the resume be easier if it were a "close enough" resume? Personally, I wouldn't be at all bothered by the resume re-cracking several minutes or even a couple of hours worth of work that it ha...
Incisive Feature Requests 7 24,181 11-03-2011, 04:26 PM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: 0.07(1?) MSSQL 2000/5 dictionary attack failure (e...

With a given file of sample hashes, and a small dictionary which should find at least one password without rules, and at least one password with a given rule, I'm getting 0 results in Straight mode, t...
Incisive Very old oclHashcat-plus Support 7 15,717 03-28-2012, 07:08 PM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...

atom Wrote: (03-29-2012, 10:03 AM) -- you have to reformat the hashes, see my example above -- Given that there are several SQL 2000 hashes, and two SQL 2005 hashes, and you can see the line length...
Incisive Very old oclHashcat-plus Support 7 15,717 03-29-2012, 04:17 PM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...

I just tested 0.08 with the hashcat 0.39 examples, and got fully correct results on a 6950; I'll test the 6450 out soon and report back.
Incisive Very old oclHashcat-plus Support 7 15,717 05-04-2012, 05:41 AM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...

I just pulled out 0.06, dropped it into the hashcat-gui-0.5.1 directory, and that doesn't work for me either. Could it be the AMD 6450 512MB card, and/or Catalyst 12.2 (I reinstalled Catalyst with ...
Incisive Very old oclHashcat-plus Support 7 15,717 03-28-2012, 09:50 PM
    Thread: amd catalyst 13.1
Post: RE: amd catalyst 13.1

What Windows error are you getting with 13.1? See my post about Permission denied followed by "stopped working" - are you getting the same error, or a different one? What's your command line? What ...
Incisive Very old oclHashcat-plus Support 7 14,712 03-31-2013, 10:32 PM
    Thread: status from gpu cracking?
Post: RE: status from gpu cracking?

First, you may be confusing the "lite" version with the "plus" version. lite is designed to operate on a single hash, fed in on the command line. plus is designed to operate on a file of hashes. He...
Incisive Very old oclHashcat-plus Support 8 18,269 04-05-2013, 01:10 AM
    Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos

You can use Code: -- --outfile=Myfile.out --outfile-format=5 -- instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's...
Incisive General Talk 8 14,736 05-03-2013, 04:26 PM