Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Here's a sample of some brute force rules I use as "starters" - a few date and phone number format based ones, some statistically generated per-position sets, and a few basic keywalking rules, with DO...
Incisive Old oclHashcat Support 4 18,277 01-24-2014, 10:08 PM
    Thread: Best long brute-force masks
Post: RE: Best long brute-force masks

Thank you for the reminder; I need to look that up!
Incisive Old oclHashcat Support 4 18,277 01-27-2014, 06:12 AM
    Thread: oclHashcat-plus: resume after shutdown
Post: RE: oclHashcat-plus: resume after shutdown

Would the resume be easier if it were a "close enough" resume? Personally, I wouldn't be at all bothered by the resume re-cracking several minutes or even a couple of hours worth of work that it ha...
Incisive Feature Requests 7 24,181 11-03-2011, 04:26 PM
    Thread: 1Password - AgileBits
Post: RE: 1Password - AgileBits

I'd also very, very much like to see *Hashcat* support PBKDF2(HMAC-xxx, passphrase, salt, iterations, outputLengthInBits) for at least SHA-1, and preferably the entire SHA-1, SHA-2, and SHA-3 families...
Incisive Very old oclHashcat-plus Support 13 24,894 04-01-2013, 04:31 PM
    Thread: [Release] Unified List Manager (ULM)
Post: RE: [Release] Unified List Manager (ULM)

First, thank you for being willing to provide the community with another set of tools - in particular, in a cross-platform tool with a nice GUI! I'd like to suggest that once you're happy with the ...
Incisive General Talk 10 25,576 10-10-2013, 05:28 AM
    Thread: Operating Systems used by hashcat users
Post: RE: Operating Systems used by hashcat users

forumhero Wrote: (06-08-2012, 02:30 AM) -- i use both windows and linux -- +1 - I use Windows (7 Home Premium, 7 Pro)/ATI, Linux (Debian Squeeze, Backtrack 5R2)/ATI, Windows/NVIDIA, and Linux/NVIDI...
Incisive Organisation and Events 10 28,242 06-08-2012, 04:37 AM
    Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...

To be fair, PBKDF2(HMAC-SHA1, pw, salt, 1000, 256) is absolutely much better than the previous SHA1(pw, salt). Completely insufficent and quite silly, but still better than we had. PBKDF2(HMAC-SHA-3...
Incisive Feature Requests 6 30,198 12-12-2012, 09:30 PM
    Thread: SIP (MD5)
Post: RE: SIP (MD5)

It looks like SIP has at least two places that use MD5 digest: One of which is in the password storage on disk on the SIP server - that's the MD5(username:domain:password). The other place is duri...
Incisive Feature Requests 5 31,780 08-31-2012, 09:13 PM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Set --outfile-format=7 (or whatever the hashcat CLI version of that argument is) and see if the hex versions of the passwords are identical; perhaps there's a nonprintable character in one or the othe...
Incisive General Help 15 33,313 04-14-2013, 05:37 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Awesome job, philsmd!!! Mem5, I would suggest you put in a Trac ticket with the outfile-format=7 results and philsmd's test cases, since outfile-format=7 should have shown something like the correct:...
Incisive General Help 15 33,313 04-15-2013, 06:12 AM
    Thread: Is it a md5 colision ?
Post: RE: Is it a md5 colision ?

Mem5 Wrote: (04-19-2013, 07:51 AM) -- Ok, I'll open a TRAC. Thank you for your help. Curious question : how can somebody login into a system using a password with the null byte character ? As it i...
Incisive General Help 15 33,313 04-19-2013, 12:02 PM
    Thread: version `GLIBC_2.14' not found (required by ./cudaHashcat64.bin)
Post: RE: version `GLIBC_2.14' not found (required by ./...

For those of us trying to use Debian Wheezy, is there a simple way of satisfying the dependency? I don't get into testing packages often.
Incisive Old oclHashcat Support 9 34,157 07-22-2014, 05:25 AM
    Thread: hashcat-gui v0.5.0
Post: RE: hashcat-gui v0.5.0

Thank you very much for continuing to update the GUI! I've found it exceedingly helpful, both to actually run the hashcat programs easily, and to generate the command lines for later regression tests...
Incisive Very old hashcat-GUI Announcements 5 36,817 01-16-2012, 05:34 PM
    Thread: mp64: generate total random words
Post: RE: mp64: generate total random words

A couple other random number generators that may be good sources for those that need them: gpg --gen-random 2 openssl rand
Incisive hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 20 42,461 05-21-2012, 06:09 PM
    Thread: SQL 2012 password hash
Post: SQL 2012 password hash

Please include the SQL 2012 password hash; it's identical to 2005, except 0x0200 as an ID instead of 0x0100 SHA-512 instead of SHA1 i.e. a sanitized test version run on SQL Server itself shows th...
Incisive Feature Requests 11 42,563 08-17-2012, 11:45 PM
    Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash

Here's SQL2012 results for the hashcat example file A0.M1300.word: SELECT example, pwdencrypt(example) FROM (SELECT 'carlos' AS example UNION ALL SELECT 'test' UNION ALL SELECT 'test1' UNION ALL...
Incisive Feature Requests 11 42,563 08-20-2012, 05:05 PM
    Thread: SQL 2012 password hash
Post: RE: SQL 2012 password hash

radix Wrote: (08-21-2012, 11:22 AM) -- I've added this even though SQL documentation advises against using pwencrypt to hash passwords (bad admins will bad admin). Should be available in the next re...
Incisive Feature Requests 11 42,563 08-21-2012, 11:46 PM
    Thread: Cisco ASA
Post: RE: Cisco ASA

fuzztester Wrote: (10-18-2012, 08:25 PM) -- I checked out using the maskprocess and piping it in. It does work but I must say, the performance was no where near as fast as a straight brute force mode...
Incisive Very old oclHashcat-plus Support 15 45,264 10-18-2012, 10:15 PM
    Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...

Thank you for looking into this, Atom. The speed drop is pretty significant, but the larger host memory requirement is just a budget issue for those that need to do that level of auditing. Would i...
Incisive Feature Requests 22 50,743 05-21-2012, 06:25 PM
    Thread: Support recovery of passwords of length 16 and above
Post: RE: Support recovery of passwords of length 16 and...

atom Wrote: (05-21-2012, 06:35 PM) -- In theory yes, but then we would require special Kernels for each Hash-lenght (in steps of 4). If you take a look at the kernels directory, it would cause the pr...
Incisive Feature Requests 22 50,743 06-07-2012, 07:17 AM