Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?

Finding blank passwords is indeed a feature, and a very important and welcome one! Not finding any other hashes, however, is a bug :(.
Incisive Old hashcat Support 5 8,980 09-27-2012, 05:05 PM
    Thread: SIP (MD5)
Post: RE: SIP (MD5)

It looks like SIP has at least two places that use MD5 digest: One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password). The other place is duri...
Incisive Feature Requests 5 31,778 08-31-2012, 09:13 PM
    Thread: Hashcat 0.41 mode 1731 fails?
Post: Hashcat 0.41 mode 1731 fails?

On hashcat 0.41 I'm not getting successful results (except with an apparent blank password) with -m 1731 on either your example hashes or even my own tests. Intel Core i7-2600 Code: -- hashca...
Incisive Old hashcat Support 5 8,980 09-26-2012, 05:40 PM
    Thread: restarting dictionary with rules
Post: RE: restarting dictionary with rules

atom Wrote: (06-11-2012, 09:31 AM) -- No, only oclHashcat-lite can do this. oclHashcat-plus is designed for short runs. -- I don't know if it's possible, and I understand there are some technical i...
Incisive Very old oclHashcat-plus Support 4 8,429 06-11-2012, 09:56 PM
    Thread: How should I store my users passwords in my DB?
Post: RE: How should I store my users passwords in my DB...

1) Don't enforce a short maximum length - you're storing a hash, so if they want to use an epic passpoem, let them. The lower the number of scrypt or PBKDF2 iterations, the longer the minimum length ...
Incisive General Help 4 10,284 07-19-2012, 08:57 PM
  Smile Thread: 7970 reaches 90 celsius
Post: RE: 7970 reaches 90 celsius

+1 on better cooling for both the card and the case - cold air in, over the heat sinks, hot air out. Arctic has a great reputation, and it's really not that difficult to swap out the cooler. Also, t...
Incisive General Help 4 12,902 03-24-2013, 01:19 AM
    Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: oclhashcat-Plus64.exe 0.14 permission denied, "sto...

Running some tests on the linkedin hash list, with oclhashcat-Plus4 in brute force mode (3), using --remove and --outfile-format=7, at some points when many hashes are being cracked quickly, I'll see ...
Incisive Very old oclHashcat-plus Support 4 10,852 03-30-2013, 11:34 PM
    Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...

This error appears to be highly correlated with https://hashcat.net/forum/thread-2182-post-13101.html, "oclhashcat-Plus64.exe 0.14 bizzare output sections".
Incisive Very old oclHashcat-plus Support 4 10,852 03-31-2013, 05:23 AM
    Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...

Got it, and I'll put it in the Trac as well. https://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php (https://www.adeptus-mechanicus.com/codex/hashpass/hashpass.php) unmasked-100, a.k.a. unmask...
Incisive Very old oclHashcat-plus Support 4 10,852 03-31-2013, 08:54 PM
    Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: RE: oclhashcat-Plus64.exe 0.14 permission denied, ...

https://hashcat.net/trac/ticket/111 (https://hashcat.net/trac/ticket/111)
Incisive Very old oclHashcat-plus Support 4 10,852 03-31-2013, 09:10 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ...
Incisive Very old oclHashcat-plus Support 4 8,933 04-18-2013, 04:30 AM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th...
Incisive Very old oclHashcat-plus Support 4 8,933 04-19-2013, 12:32 PM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: Attack mode 6, 7 slower than Maskprocessor ruleset...

I'm working up a set of prefix and suffix based dictionary cracks, and my very first pass was 1, 2, and 3 digit prefixes/suffixes. Using oclHashcat-plus64 0.14, on an AMD HD6950 with Catalyst 13.1,...
Incisive Very old oclHashcat-plus Support 4 8,933 04-17-2013, 05:10 AM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 18,277 01-24-2014, 10:08 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 18,277 01-27-2014, 06:12 AM
    Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: PBKDF2/RFC2898/PKCS#5 modes?

As a less immediate, longer term project, I'd like to request generic PBKDF2 (also known as RFC2898 and PKCS#5) support, in whichever applications can reasonably support it. For hash algorithms, I'd ...
Incisive Feature Requests 3 12,258 08-22-2012, 06:28 PM
    Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: RE: PBKDF2/RFC2898/PKCS#5 modes?

Aside from some applications following the OWASP Password Storage Cheat Sheet: Django web framework https://code.djangoproject.com/ticket/15367 https://www.levigross.com/post/18880148948/a-review-of...
Incisive Feature Requests 3 12,258 08-27-2012, 10:45 PM
    Thread: problems with basic bruteforcing
Post: RE: problems with basic bruteforcing

A few other ways to generate hashes, for any users wanting to make sure their technique is giving the same results as other techniques: Windows: Code: -- copy con password.txt 1234^z md5sum pas...
Incisive Old hashcat Support 3 6,459 04-03-2013, 04:14 PM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...

If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes. The archived thread on SQL Server 2012 hashes is at: https://hashcat.net/foru...
Incisive General Talk 3 9,888 04-04-2014, 04:12 PM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...

It's still using the 0x200 identifier; I just double-checked.
Incisive General Talk 3 9,888 04-07-2014, 04:23 AM