Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

I'll run that test and post results. ETA: Still trying to duplicate the error even with --output-format=7; the "stopped working" error I just posted appears to be more frequent than the output corrup...
Incisive Very old oclHashcat-plus Support 9 16,175 03-30-2013, 07:20 PM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

https://hashcat.net/trac/ticket/111 (https://hashcat.net/trac/ticket/111)
Incisive Very old oclHashcat-plus Support 9 16,175 03-31-2013, 09:10 PM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

Interesting - thank you for the additional information! I have zero (0) evidence of driver restarts or anything like that, and during diagnosis, I used the ATI Catalyst graphics overclocking sectio...
Incisive Very old oclHashcat-plus Support 9 16,175 04-03-2013, 04:08 PM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: oclhashcat-Plus64.exe 0.14 bizzare output sections

Running some tests on the linkedin hash list, with oclhashcat-Plus4 in brute force mode (3), using --remove and --outfile-format=7, looking I see a lot of hashes cracked, in hash:plaintextPW:hexPW for...
Incisive Very old oclHashcat-plus Support 9 16,175 03-29-2013, 09:24 PM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

Yes, it's repeatable without any --output-format at all, though there are fewer short rows after the long rows. Moreover, further testing indicates it happens just before the "has stopped working" Wi...
Incisive Very old oclHashcat-plus Support 9 16,175 03-31-2013, 05:21 AM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

Honestly, I don't know what the "has stopped working" Windows error is, but it not accompanied by the more usual driver crashes where the entire screen freezes/blanks out for a bit, and then the a sma...
Incisive Very old oclHashcat-plus Support 9 16,175 04-04-2013, 06:13 AM
    Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...

For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often.
Incisive Old oclHashcat Support 9 34,157 07-22-2014, 05:25 AM
    Thread: Operating Systems used by hashcat users
Post: RE: Operating Systems used by hashcat users

forumhero Wrote: (06-08-2012, 02:30 AM) -- i use both windows and linux -- +1 - I use Windows (7 Home Premium, 7 Pro)/ATI, Linux (Debian Squeeze, Backtrack 5R2)/ATI, Windows/NVIDIA, and Linux/NVIDI...
Incisive Organisation and Events 10 28,242 06-08-2012, 04:37 AM
    Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)

First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI! I'd like to suggest that once you're happy with the ...
Incisive General Talk 10 25,576 10-10-2013, 05:28 AM
    Thread: SQL 2012 password hash
Post: SQL 2012 password hash

Please include the SQL 2012 password hash; it's identical to 2005, except 0x0200 as an ID instead of 0x0100 SHA-512 instead of SHA1 i.e. a sanitized test version run on SQL Server itself shows th...
Incisive Feature Requests 11 42,563 08-17-2012, 11:45 PM
    Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash

Here's SQL2012 results for the hashcat example file A0.M1300.word: SELECT example, pwdencrypt(example) FROM (SELECT 'carlos' AS example UNION ALL SELECT 'test' UNION ALL SELECT 'test1' UNION ALL...
Incisive Feature Requests 11 42,563 08-20-2012, 05:05 PM
    Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash

radix Wrote: (08-21-2012, 11:22 AM) -- I've added this even though SQL documentation advises against using pwencrypt to hash passwords (bad admins will bad admin). Should be available in the next re...
Incisive Feature Requests 11 42,563 08-21-2012, 11:46 PM
    Thread: 1Password - AgileBits
Post: RE: 1Password - AgileBits

I'd also very, very much like to see *Hashcat* support PBKDF2(HMAC-xxx, passphrase, salt, iterations, outputLengthInBits) for at least SHA-1, and preferably the entire SHA-1, SHA-2, and SHA-3 families...
Incisive Very old oclHashcat-plus Support 13 24,894 04-01-2013, 04:31 PM
    Thread: oclHashcat-plus v0.08
Post: RE: oclHashcat-plus v0.08

Thank you very much for the new release; in particular, the new EULA is very generous on your part, given how much time you put into hashcat. I'll be passing the information on the new EULA along to ...
Incisive Very old oclHashcat-plus Announcements 15 58,083 05-04-2012, 05:51 AM
    Thread: Cisco ASA
Post: RE: Cisco ASA

fuzztester Wrote: (10-18-2012, 08:25 PM) -- I checked out using the maskprocess and piping it in. It does work but I must say, the performance was no where near as fast as a straight brute force mode...
Incisive Very old oclHashcat-plus Support 15 45,264 10-18-2012, 10:15 PM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe...
Incisive General Help 15 33,313 04-14-2013, 05:37 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Awesome job, philsmd!!! Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:...
Incisive General Help 15 33,313 04-15-2013, 06:12 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Mem5 Wrote: (04-19-2013, 07:51 AM) -- Ok, I'll open a TRAC. Thank you for your help. Curious question : how can somebody login into a system using a password with the null byte character ? As it i...
Incisive General Help 15 33,313 04-19-2013, 12:02 PM
    Thread: oclHashcat-plus v0.06
Post: RE: oclHashcat-plus v0.06

Thank you very much for including the two MSSQL modes; those will be extremely useful for dictionary based password cracking of SQL Server passwords!
Incisive Very old oclHashcat-plus Announcements 17 65,586 09-20-2011, 06:01 PM
    Thread: mp64: generate total random words
Post: RE: mp64: generate total random words

A couple other random number generators that may be good sources for those that need them: gpg --gen-random 2 openssl rand
Incisive hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 20 42,461 05-21-2012, 06:09 PM