Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th...
Incisive Very old oclHashcat-plus Support 4 8,933 04-19-2013, 12:32 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 18,277 01-24-2014, 10:08 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 18,277 01-27-2014, 06:12 AM
    Thread: Cisco ASA
Post: RE: Cisco ASA

fuzztester Wrote: (10-18-2012, 08:25 PM) -- I checked out using the maskprocess and piping it in. It does work but I must say, the performance was no where near as fast as a straight brute force mode...
Incisive Very old oclHashcat-plus Support 15 45,253 10-18-2012, 10:15 PM
    Thread: Cracking MSSQL(2005) hashes
Post: RE: Cracking MSSQL(2005) hashes

On the SQL Servers you are authorized to audit: SELECT sys.syslogins.name , sys.server_principals.type , LOGINPROPERTY(sys.syslogins.name,'PasswordHash') AS HashcatFormat , UPPER(RIGHT(sys.fn_va...
Incisive Very old oclHashcat-plus Support 2 12,195 12-16-2011, 11:27 PM
    Thread: Creating a secure hash?
Post: RE: Creating a secure hash?

As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT. For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u...
Incisive General Talk 6 12,456 01-24-2014, 09:50 PM
    Thread: Hashcat 0.41 Combination mode not loading more than one dictionary?
Post: RE: Hashcat 0.41 Combination mode not loading more...

Thank you for informing me!
Incisive Old hashcat Support 2 7,639 10-08-2012, 05:23 PM
    Thread: Hashcat 0.41 mode 1731 fails?
Post: RE: Hashcat 0.41 mode 1731 fails?

Finding blank passwords is indeed a feature, and a very important and welcome one! Not finding any other hashes, however, is a bug :(.
Incisive Old hashcat Support 5 8,980 09-27-2012, 05:05 PM
    Thread: hashcat-gui v0.5.0
Post: RE: hashcat-gui v0.5.0

Thank you very much for continuing to update the GUI! I've found it exceedingly helpful, both to actually run the hashcat programs easily, and to generate the command lines for later regression tests...
Incisive Very old hashcat-GUI Announcements 5 36,814 01-16-2012, 05:34 PM
    Thread: How should I store my users passwords in my DB?
Post: RE: How should I store my users passwords in my DB...

1) Don't enforce a short maximum length - you're storing a hash, so if they want to use an epic passpoem, let them. The lower the number of scrypt or PBKDF2 iterations, the longer the minimum length ...
Incisive General Help 4 10,284 07-19-2012, 08:57 PM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe...
Incisive General Help 15 33,303 04-14-2013, 05:37 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Awesome job, philsmd!!! Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:...
Incisive General Help 15 33,303 04-15-2013, 06:12 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Mem5 Wrote: (04-19-2013, 07:51 AM) -- Ok, I'll open a TRAC. Thank you for your help. Curious question : how can somebody login into a system using a password with the null byte character ? As it i...
Incisive General Help 15 33,303 04-19-2013, 12:02 PM
    Thread: mp64: generate total random words
Post: RE: mp64: generate total random words

A couple other random number generators that may be good sources for those that need them: gpg --gen-random 2 openssl rand
Incisive hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 20 42,453 05-21-2012, 06:09 PM
    Thread: oclHashcat-plus v0.06
Post: RE: oclHashcat-plus v0.06

Thank you very much for including the two MSSQL modes; those will be extremely useful for dictionary based password cracking of SQL Server passwords!
Incisive Very old oclHashcat-plus Announcements 17 65,576 09-20-2011, 06:01 PM
    Thread: oclHashcat-plus v0.06 - add support for md5($pass.$salt)
Post: RE: oclHashcat-plus v0.06 - add support for md5($p...

Could this be alleviated instead by a documentation change? for instance: md5($pass.$salt): Joomla vX1 to vY1+, App2 vX2 to vY2+, App3 vX3 to vY3+. This is a single md5 hash of the password and s...
Incisive Very old oclHashcat-plus Support 5 12,825 12-20-2011, 04:49 PM
    Thread: oclHashcat-plus v0.08
Post: RE: oclHashcat-plus v0.08

Thank you very much for the new release; in particular, the new EULA is very generous on your part, given how much time you put into hashcat. I'll be passing the information on the new EULA along to ...
Incisive Very old oclHashcat-plus Announcements 15 58,070 05-04-2012, 05:51 AM
    Thread: oclHashcat-plus v0.13 and oclHashcat-lite v0.14
Post: RE: oclHashcat-plus v0.13 and oclHashcat-lite v0.1...

Dolphin Wrote: (02-02-2013, 01:19 PM) -- I'm personally seeing a slight decrease in performance when upgrading to Catalyst 13.1 (up to 15% on some algorithms) but that's not really a reason to compla...
Incisive Very old oclHashcat-plus Announcements 35 88,966 02-04-2013, 08:36 PM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

I'll run that test and post results. ETA: Still trying to duplicate the error even with --output-format=7; the "stopped working" error I just posted appears to be more frequent than the output corrup...
Incisive Very old oclHashcat-plus Support 9 16,173 03-30-2013, 07:20 PM
    Thread: oclhashcat-Plus64.exe 0.14 bizzare output sections
Post: RE: oclhashcat-Plus64.exe 0.14 bizzare output sect...

Yes, it's repeatable without any --output-format at all, though there are fewer short rows after the long rows. Moreover, further testing indicates it happens just before the "has stopped working" Wi...
Incisive Very old oclHashcat-plus Support 9 16,173 03-31-2013, 05:21 AM