Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [asc] Author Forum Replies Views Posted
    Thread: Workstation GPU support (NVIDIA Quadro, ATI FirePro)
Post: Workstation GPU support (NVIDIA Quadro, ATI FirePr...

I realize it's suboptimal, but work password auditing must be done on work supplied hardware, unfortunately - compliance with corporate standards trumps speed. As long as I can get similar or faster ...
Incisive Hardware 0 4,515 02-20-2014, 07:42 PM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: SQL Server 2014 pw hashes are identical to SQL Ser...

If it matters to anyone else, SQL Server 2014 RTM creates password hashes identical to SQL Server 2012 password hashes. The archived thread on SQL Server 2012 hashes is at: https://hashcat.net/foru...
Incisive General Talk 3 9,888 04-04-2014, 04:12 PM
    Thread: SQL 2012 password hash
Post: SQL 2012 password hash

Please include the SQL 2012 password hash; it's identical to 2005, except 0x0200 as an ID instead of 0x0100 SHA-512 instead of SHA1 i.e. a sanitized test version run on SQL Server itself shows th...
Incisive Feature Requests 11 42,559 08-17-2012, 11:45 PM
    Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)

First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI! I'd like to suggest that once you're happy with the ...
Incisive General Talk 10 25,569 10-10-2013, 05:28 AM
    Thread: Why closed source?
Post: RE: Why closed source?

Personally, I would like to thank Atom and all the other contributors to Hashcat for continuing to offer it to the security community for free. That, in and of itself, is both very generous, and very...
Incisive General Talk 29 65,453 10-10-2013, 05:04 AM
    Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...

For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often.
Incisive Old oclHashcat Support 9 34,153 07-22-2014, 05:25 AM
    Thread: using 2 dictionaries
Post: RE: using 2 dictionaries

If they're really that small (there aren't that many 4 letter words), then one option you have would be to create a dictionary of the two digits, and then use the hashcat-utils "combinator" program to...
Incisive Very old oclHashcat-plus Support 2 6,637 03-31-2013, 09:16 PM
    Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...

Thank you for looking into this, Atom. The speed drop is pretty significant, but the larger host memory requirement is just a budget issue for those that need to do that level of auditing. Would i...
Incisive Feature Requests 22 50,740 05-21-2012, 06:25 PM
    Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...

atom Wrote: (05-21-2012, 06:35 PM) -- In theory yes, but then we would require special Kernels for each Hash-lenght (in steps of 4). If you take a look at the kernels directory, it would cause the pr...
Incisive Feature Requests 22 50,740 06-07-2012, 07:17 AM
    Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...

Hash-IT Wrote: (06-07-2012, 02:47 PM) -- Your ideas about reducing download size are good, but it would mean atom having to make many builds. -- Agreed; that's why I suggested automated build scrip...
Incisive Feature Requests 22 50,740 06-08-2012, 04:33 AM
    Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...

To be fair, PBKDF2(HMAC-SHA1, pw, salt, 1000, 256) is absolutely much better than the previous SHA1(pw, salt). Completely insufficent and quite silly, but still better than we had. PBKDF2(HMAC-SHA-3...
Incisive Feature Requests 6 30,191 12-12-2012, 09:30 PM
    Thread: status from gpu cracking?
Post: RE: status from gpu cracking?

First, you may be confusing the "lite" version with the "plus" version. lite is designed to operate on a single hash, fed in on the command line. plus is designed to operate on a file of hashes. He...
Incisive Very old oclHashcat-plus Support 8 18,264 04-05-2013, 01:10 AM
    Thread: SQL Server 2014 pw hashes are identical to SQL Server 2012 pw hashes
Post: RE: SQL Server 2014 pw hashes are identical to SQL...

It's still using the 0x200 identifier; I just double-checked.
Incisive General Talk 3 9,888 04-07-2014, 04:23 AM
    Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash

Here's SQL2012 results for the hashcat example file A0.M1300.word: SELECT example, pwdencrypt(example) FROM (SELECT 'carlos' AS example UNION ALL SELECT 'test' UNION ALL SELECT 'test1' UNION ALL...
Incisive Feature Requests 11 42,559 08-20-2012, 05:05 PM
    Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash

radix Wrote: (08-21-2012, 11:22 AM) -- I've added this even though SQL documentation advises against using pwencrypt to hash passwords (bad admins will bad admin). Should be available in the next re...
Incisive Feature Requests 11 42,559 08-21-2012, 11:46 PM
    Thread: SIP (MD5)
Post: RE: SIP (MD5)

It looks like SIP has at least two places that use MD5 digest: One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password). The other place is duri...
Incisive Feature Requests 5 31,778 08-31-2012, 09:13 PM
    Thread: restarting dictionary with rules
Post: RE: restarting dictionary with rules

atom Wrote: (06-11-2012, 09:31 AM) -- No, only oclHashcat-lite can do this. oclHashcat-plus is designed for short runs. -- I don't know if it's possible, and I understand there are some technical i...
Incisive Very old oclHashcat-plus Support 4 8,429 06-11-2012, 09:56 PM
    Thread: problems with basic bruteforcing
Post: RE: problems with basic bruteforcing

A few other ways to generate hashes, for any users wanting to make sure their technique is giving the same results as other techniques: Windows: Code: -- copy con password.txt 1234^z md5sum pas...
Incisive Old hashcat Support 3 6,459 04-03-2013, 04:14 PM
    Thread: PBKDF2/RFC2898/PKCS#5 modes?
Post: RE: PBKDF2/RFC2898/PKCS#5 modes?

Aside from some applications following the OWASP Password Storage Cheat Sheet: Django web framework https://code.djangoproject.com/ticket/15367 https://www.levigross.com/post/18880148948/a-review-of...
Incisive Feature Requests 3 12,258 08-27-2012, 10:45 PM
    Thread: Operating Systems used by hashcat users
Post: RE: Operating Systems used by hashcat users

forumhero Wrote: (06-08-2012, 02:30 AM) -- i use both windows and linux -- +1 - I use Windows (7 Home Premium, 7 Pro)/ATI, Linux (Debian Squeeze, Backtrack 5R2)/ATI, Windows/NVIDIA, and Linux/NVIDI...
Incisive Organisation and Events 10 28,235 06-08-2012, 04:37 AM