Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Bruteforce + rules
Post: Bruteforce + rules

Consider the following scenario: you have to crack a md5 hash which belong to a password which has a lenght of 16 characters with the following format: $password = $word . $word; # password is the du...
asirena hashcat 14 14,519 11-22-2017, 03:22 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

phahRoe1, thanks for your answer, but... I know how to use mask attacks, bruteforce attacks, dictionary attack, and rules. And I have read these links too. In fact, it works. But it is very very...
asirena hashcat 14 14,519 11-22-2017, 04:35 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

What is the point to generate 857,375 rules when I'm only interested in one of them: duplicate (concatenate with itself) the random word? Well, you'll get more speed but it'll be based on processin...
asirena hashcat 14 14,519 11-22-2017, 05:02 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

royce, thanks. I'll try something like that. Anyway, it would be so easier if there was possible to use rules with brute force attacks. So, what is the reason for not allowing that?
asirena hashcat 14 14,519 11-22-2017, 02:42 PM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

royce, I'm guessing too but from my point of view there shouldn't be any big differences between taking words from a dictionary/file or generating them internally and then apply the rules to them. So ...
asirena hashcat 14 14,519 11-22-2017, 08:10 PM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

Thank to both very much indeed. I have just tried it and works better than simply generate all of them with maskprocessor (in addition I was trying it on a notebook without a GPU, so the improving is ...
asirena hashcat 14 14,519 11-23-2017, 03:45 AM
    Thread: Bruteforce + rules
Post: RE: Bruteforce + rules

I think so because if you make a proof using a dictionary file you get a speed similar to that hybrid attack. So it could be another interesting reason to consider allowing the use of rules directly i...
asirena hashcat 14 14,519 11-24-2017, 09:56 PM
    Thread: hashcat 4.0.1 more slow than 3.6 (GT 740M)
Post: RE: hashcat 4.0.1 more slow than 3.6 (GT 740M)

atom, you should use the same parameter in both cases in order to compare the results... If you use -w4 with one of them and -w3 with the other one, you are rigging the results, aren't you? Co...
asirena hashcat 7 6,852 11-22-2017, 02:38 PM
    Thread: hashcat 4.0.1 more slow than 3.6 (GT 740M)
Post: RE: hashcat 4.0.1 more slow than 3.6 (GT 740M)

royce, I think I have been polite, haven't I? And I haven't said any lie, have I? So I don't understand your words against me (I would like to ask you if you can avoid things like that in the future, ...
asirena hashcat 7 6,852 11-22-2017, 10:01 PM
    Thread: LUKS benchmarks and estimated times
Post: RE: LUKS benchmarks and estimated times

It will take many thousands of years. According to the speed indicated by royce, using one of the most powerful graphics cards of the moment: * if it was only digits, it'd take: 10¹⁰/(10KH/s * 60...
asirena hashcat 2 3,481 11-27-2017, 02:53 PM