Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: DECRYPTUM
Post: RE: DECRYPTUM

Very cool, what are you using this beast of a machine for? Ah I see it's a commercial device on https://www.decryptum.com/ (https://www.decryptum.com/)
DanielG Hardware 12 1,219 09-16-2020, 10:07 AM
    Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt

First step is to have a test password that you know so you can test your hypothesis. Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex...
DanielG hashcat 4 1,105 03-19-2020, 04:14 PM
    Thread: Intercept zip decryption key or files from an application
Post: RE: Intercept zip decryption key or files from an ...

Yes but it heavily depends on the application and how you have access to it. You can decompile the application and look for the password, debug the running application, run a trace on calls that are b...
DanielG General Talk 1 719 03-12-2020, 05:33 PM
    Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing

Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788
DanielG User Contributions 4 2,758 03-04-2020, 10:10 AM
    Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow

Ulfr11 Wrote: (02-27-2020, 04:36 AM) -- ?h is much faster mask than ?a in brute Force attacks -- Yes, counting to 10 is faster than counting to 100.
DanielG hashcat 5 1,805 02-27-2020, 02:48 PM
    Thread: Need help to identify encryption
Post: RE: Need help to identify encryption

On a lot of "Default Usernames & Passwords" lists for routers Huawei devices seem to have the password 'admin' or '[email protected]' as the password. Perhaps try that before trying to break the config...
DanielG hashcat 2 1,118 02-10-2020, 11:52 AM
    Thread: Pantagrule, a really large last-resort ruleset
Post: RE: Pantagrule, a really large last-resort ruleset

Cool, thanks for your contribution. I added it to my rules/ folder. Always nice to have different rulesets based on real world data.
DanielG User Contributions 2 1,659 01-14-2020, 01:34 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Thank you!
DanielG hashcat 11 8,569 01-09-2020, 09:48 AM
    Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...

okay, googling a bit more it seems the format is pretty open. The fileformat is described on https://www.aescrypt.com/aes_file_format.html and there is source on https://github.com/kenkendk/sharpaescr...
DanielG General Talk 20 5,128 01-08-2020, 10:18 AM
    Thread: Is there a way to extract a password hash from AESCrypt archive?
Post: RE: Is there a way to extract a password hash from...

on the official forum there is a topic about bruteforce a forgotten password on https://forums.packetizer.com/viewtopic.php?f=72&t=1333 there is a slow python version using the tool itself but a user ...
DanielG General Talk 20 5,128 01-08-2020, 09:56 AM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting.
DanielG hashcat 11 8,569 01-06-2020, 05:50 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

"My thinking was to crack the old NTLM hash, key it into AD" I think you can change it back without knowing what the old password was. You can set the old NTLM hash with lsadump::ChangeNTLM /server:A...
DanielG hashcat 11 8,569 01-03-2020, 05:19 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

I don't get what your goal is here, any domain admin can change the password of the account so that is your best option. You don't need to crack the NTLM hash for most other 'less-ethical' use cas...
DanielG hashcat 11 8,569 01-03-2020, 09:43 AM
    Thread: VNC challenge response password crack
Post: RE: VNC challenge response password crack

Wow very cool, according to https://en.wikipedia.org/wiki/Virtual_Network_Computing there are different protocols used by different VNC clients. Which protocol / clients use this particular method of ...
DanielG User Contributions 2 2,609 12-18-2019, 04:34 PM
    Thread: Advice for Reviving Old Machine for Hashcat
Post: RE: Advice for Reviving Old Machine for Hashcat

Before buying hardware make sure cracking is feasible. What do you know about the password for the truecrypt container? If you only know it is 20 characters for example you will never crack it. But if...
DanielG hashcat 5 1,621 12-12-2019, 10:33 AM
    Thread: Masking question
Post: RE: Masking question

https://hashcat.net/wiki/doku.php?id=mask_attack Quote: -- A placeholder can be either a custom charset variable, a built-in charset variable or a static letter -- so yeah, just a?a?a?a?a?a?a?...
DanielG hashcat 2 1,140 11-01-2019, 04:03 PM
    Thread: MD5 question
Post: RE: MD5 question

mdxfind looks cool, https://www.techsolvency.com/pub/bin/mdxfind/ "Multi-iteration: can try thousands of iteration counts of any of these core algorithms". On https://www.techsolvency.com/pub/bin/...
DanielG hashcat 6 2,048 10-31-2019, 12:24 PM
    Thread: MD5 question
Post: RE: MD5 question

1. know exactly how many times it is hashed (3,4,5,etc) 2. write a custom kernel that can handle the exact amount of md5 rounds
DanielG hashcat 6 2,048 10-31-2019, 10:01 AM
    Thread: MD5 Help
Post: RE: MD5 Help

Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities. These guys at www.onlinehashcrack.c...
DanielG hashcat 4 1,655 10-21-2019, 08:51 AM
    Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $

Cool, nice way you found that out too
DanielG General Talk 4 1,671 09-25-2019, 09:17 AM