Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: 3Des - ECB brute forcing
Post: RE: 3Des - ECB brute forcing

Well we know the ciphertext of 12345678, password, and adobe123. So that's enough needed. Also you wouldn't brute force this you would take all 2^56 keys and encrypt one of the plaintext blocks. Stori...
Sc00bz Very old oclHashcat-plus Support 10 40,318 11-12-2013, 02:10 AM
    Thread: Android Full Disk Encryption
Post: RE: Android Full Disk Encryption

If you decrypt the second AES block in the superblock, then you can test the following which gets you around 1 in 2 ^ 92.3: Code: -- Offset (bytes) | Size (bytes) | Description ---------------+----...
Sc00bz User Contributions 13 55,403 04-28-2013, 09:24 PM
    Thread: Haswell bench
Post: RE: Haswell bench

kartan Wrote: (06-25-2013, 03:45 AM) -- First bench in bruteforce -a 3 -m 0 gives about 96-100M on my 4770k @4,4GHz. I do more benchmarks tomorrow. -- Hey can you run this and tell me what the speed...
Sc00bz Hardware 6 11,934 06-26-2013, 12:53 PM
    Thread: Haswell bench
Post: RE: Haswell bench

Man and I was hoping for a nice speed increase. If you compare the speed to Hashcat it'll probably be on par (hashcat -m 3200 -n 1 -a 3 bcrypt.txt ?a?a?a?a?a). Hashcat might be faster since I just rea...
Sc00bz Hardware 6 11,934 06-26-2013, 04:59 PM
    Thread: Help to recover password from an unknown hash type
Post: RE: Help to recover password from an unknown hash ...

Azren, I think epixoip missed this line: Code: -- $key = trim($username).trim($cleartext_password); -- This is a very weird construction it's encrypting the password with the password. You can thi...
Sc00bz General Help 11 21,799 01-06-2015, 09:49 AM
    Thread: Help to recover password from an unknown hash type
Post: RE: Help to recover password from an unknown hash ...

Lame I was hoping this would be 16 but it's 32: Code: -- echo mcrypt_get_key_size('twofish', 'cfb'); -- So the key is the MD5 of the username and password (the key is in hex). I'm just going to...
Sc00bz General Help 11 21,799 01-06-2015, 10:35 AM
    Thread: Huge wordlist
Post: RE: Huge wordlist

Without knowing what you are doing, I'd suggest removing the last character from all the words in the word list. Sort and remove duplicates. Then do a hybrid attack to add the last character back in. ...
Sc00bz Very old oclHashcat-lite Support 9 25,440 09-10-2013, 01:17 AM
    Thread: Lastpass cracking speed
Post: RE: Lastpass cracking speed

pragmatic Wrote: (06-16-2015, 02:12 AM) -- I saw reports from our own epixoip that the cracking speed for this set up would be < 10 H/s even on the TitanX, however i'm seeing different numbers so I w...
Sc00bz General Talk 6 17,868 06-16-2015, 02:29 AM
    Thread: Openwall cracker ?!
Post: RE: Openwall cracker ?!

The "full" keyspace is 69^7 so 1.5 hours vs 24 minutes. Unless you add in foreign characters. These change depending on the system's code page. I tried to figure out the mapping and failed because ...
Sc00bz Old oclHashcat Support 4 11,019 01-28-2014, 10:43 PM
    Thread: PHD hashrunner 2013
Post: RE: PHD hashrunner 2013

I think I saw this somewhere, but I love the idea. Everyone submits a password list/generation info for 1M, 1G, 1T, 1P, or whatever. Then when a major password breach happens you test those passwords ...
Sc00bz Organisation and Events 16 39,376 05-27-2013, 02:13 PM
    Thread: Saving calculated hashes
Post: RE: Saving calculated hashes

You need to write a program that will hash using SSE2/SSSE3/AVX to make it fast. You should write truncated binary hashes to the file. Since I guess you want to make it useful, you should make a lossy...
Sc00bz General Talk 8 16,781 05-19-2013, 10:38 PM
    Thread: Support for new ASP.NET password storage practices
Post: RE: Support for new ASP.NET password storage pract...

Who thought that "PBKDF2_SHA1(pw, salt, 1000, 256)" is a good idea? Because CPU hash crackers are going to: * Checking the first 160 bits gets you 2x faster than defender. * SSE2 gets you 4x faster...
Sc00bz Feature Requests 6 30,197 11-15-2012, 06:20 AM