Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Hashcat 0.41 Combination mode not loading more than one dictionary?
Post: RE: Hashcat 0.41 Combination mode not loading more...

Thank you for informing me!
Incisive Old hashcat Support 2 7,640 10-08-2012, 05:23 PM
    Thread: Creating a secure hash?
Post: RE: Creating a secure hash?

As the competition link shows, the top 3 methods are PBKDF2/RFC2898/PKCS #5, SCRYPT, and BCRYPT. For PBKDF2, use HMAC-SHA-512 as your hash algorithm, a per-user cryptographically random salt, and u...
Incisive General Talk 6 12,456 01-24-2014, 09:50 PM
    Thread: Cracking MSSQL(2005) hashes
Post: RE: Cracking MSSQL(2005) hashes

On the SQL Servers you are authorized to audit: SELECT sys.syslogins.name , sys.server_principals.type , LOGINPROPERTY(sys.syslogins.name,'PasswordHash') AS HashcatFormat , UPPER(RIGHT(sys.fn_va...
Incisive Very old oclHashcat-plus Support 2 12,196 12-16-2011, 11:27 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

fuzztester Wrote: (10-18-2012, 08:25 PM) -- I checked out using the maskprocess and piping it in. It does work but I must say, the performance was no where near as fast as a straight brute force mode...
Incisive Very old oclHashcat-plus Support 15 45,264 10-18-2012, 10:15 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 18,277 01-24-2014, 10:08 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 18,277 01-27-2014, 06:12 AM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Agreed; however, that's why I was suggesting a conversion to a rules based attack that covers an identical keyspace, rather than forcing me to actually generate and store multiple rules files, rather ...
Incisive Very old oclHashcat-plus Support 4 8,933 04-18-2013, 04:30 AM
    Thread: Attack mode 6, 7 slower than Maskprocessor rulesets?
Post: RE: Attack mode 6, 7 slower than Maskprocessor rul...

Now, that's an approach I'm ashamed I hadn't considered - I was using the Maskprocessor to create single dictionaries of multiple , rather than simply using building block dictionaries and the fact th...
Incisive Very old oclHashcat-plus Support 4 8,933 04-19-2013, 12:32 PM
    Thread: amd catalyst 13.1
Post: RE: amd catalyst 13.1

What Windows error are you getting with 13.1? See my post about Permission denied followed by "stopped working" - are you getting the same error, or a different one? What's your command line? What ...
Incisive Very old oclHashcat-plus Support 7 14,712 03-31-2013, 10:32 PM
    Thread: All Chars = Big Chaos
Post: RE: All Chars = Big Chaos

You can use Code: -- --outfile=Myfile.out --outfile-format=5 -- instead; then at least hash and password will be in hex, except the :'s of your separator character. I don't know if the salt's...
Incisive General Talk 8 14,736 05-03-2013, 04:26 PM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

jpgoldberg Wrote: (04-17-2013, 02:44 AM) -- Remember that unlike the passwords that 1Password saves for people, the Master Password has to be memorable and typable by humans. If one uses a diceware p...
Incisive Very old oclHashcat-plus Support 44 362,055 04-17-2013, 04:58 AM
    Thread: Agilebits 1Password support and Design Flaw?
Post: RE: Agilebits 1Password support and Design Flaw?

First, let me say that this has been a great discussion, and I'd like to thank Atom for the choice to branch out into some of the more interesting formats that aren't pure hashes! Second, regarding...
Incisive Very old oclHashcat-plus Support 44 362,055 04-18-2013, 04:28 AM
    Thread: AES/Rijndael expert needed
Post: RE: AES/Rijndael expert needed

gat3way Wrote: (06-04-2012, 03:06 PM) -- Much better idea would be to use a key derivation function like PBKDF2 with ïnitial symmetric key as salt with some good iterations count. Applying the pas...
Incisive Feature Requests 5 14,079 06-07-2012, 07:10 AM
  Smile Thread: 7970 reaches 90 celsius
Post: RE: 7970 reaches 90 celsius

+1 on better cooling for both the card and the case - cold air in, over the heat sinks, hot air out. Arctic has a great reputation, and it's really not that difficult to swap out the cooler. Also, t...
Incisive General Help 4 12,905 03-24-2013, 01:19 AM
    Thread: 1Password - AgileBits
Post: RE: 1Password - AgileBits

I'd also very, very much like to see *Hashcat* support PBKDF2(HMAC-xxx, passphrase, salt, iterations, outputLengthInBits) for at least SHA-1, and preferably the entire SHA-1, SHA-2, and SHA-3 families...
Incisive Very old oclHashcat-plus Support 13 24,894 04-01-2013, 04:31 PM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...

I just pulled out 0.06, dropped it into the hashcat-gui-0.5.1 directory, and that doesn't work for me either. Could it be the AMD 6450 512MB card, and/or Catalyst 12.2 (I reinstalled Catalyst with ...
Incisive Very old oclHashcat-plus Support 7 15,717 03-28-2012, 09:50 PM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...

atom Wrote: (03-29-2012, 10:03 AM) -- you have to reformat the hashes, see my example above -- Given that there are several SQL 2000 hashes, and two SQL 2005 hashes, and you can see the line length...
Incisive Very old oclHashcat-plus Support 7 15,717 03-29-2012, 04:17 PM
    Thread: 0.07(1?) MSSQL 2000/5 dictionary attack failure (even with A0.M1300.* examples)?
Post: RE: 0.07(1?) MSSQL 2000/5 dictionary attack failur...

I just tested 0.08 with the hashcat 0.39 examples, and got fully correct results on a 6950; I'll test the 6450 out soon and report back.
Incisive Very old oclHashcat-plus Support 7 15,717 05-04-2012, 05:41 AM
    Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: PBKDF2/RFC2898/PKCS#5 modes?

As a less immediate, longer term project, I'd like to request generic PBKDF2 (also known as RFC2898 and PKCS#5) support, in whichever applications can reasonably support it. For hash algorithms, I'd ...
Incisive Feature Requests 3 12,258 08-22-2012, 06:28 PM
    Thread: oclhashcat-Plus64.exe 0.14 permission denied, "stopped working"
Post: oclhashcat-Plus64.exe 0.14 permission denied, "sto...

Running some tests on the linkedin hash list, with oclhashcat-Plus4 in brute force mode (3), using --remove and --outfile-format=7, at some points when many hashes are being cracked quickly, I'll see ...
Incisive Very old oclHashcat-plus Support 4 10,853 03-30-2013, 11:34 PM