Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [asc] Posted
    Thread: Cracking partial hex seed for Ethreum Presale
Post: Cracking partial hex seed for Ethreum Presale

Hello and thank you to any prospective helpers.  Apologies if this is obvious, but I may have missed something in the mask documentation or have been looking in the wrong place. I have been unable...
uprising_bike hashcat 10 6,388 06-29-2018, 04:23 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

phil: Sorry.  I was being silly.  I meant hex characters between 0 and F not full bytes, so (2^4)^5 =1048576.  These could be at any one of C(64, 5) = 7624512, so a space of approximately 8*10^12. ...
uprising_bike hashcat 10 6,388 06-29-2018, 05:35 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

philsmd Wrote: (06-29-2018, 05:46 PM) -- hashcat uses ?H for 0123456789ABCDEF ... the main problem now is that the hash mode -m 5000 only supports a password length of 55 bytes. ... -- This must be ...
uprising_bike hashcat 10 6,388 06-29-2018, 06:08 PM
    Thread: Cracking partial hex seed for Ethreum Presale
Post: RE: Cracking partial hex seed for Ethreum Presale

An ethpresale tool on github says this: https://github.com/kholia/ethpresale/blob/master/pyethtool/pyethtool.py Quote: -- if not seed: seed = random_key().decode('hex') # uses pybitcointools'...
uprising_bike hashcat 10 6,388 06-30-2018, 02:15 AM