Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $

Cool, nice way you found that out too
DanielG General Talk 4 1,671 09-25-2019, 09:17 AM
    Thread: MD5 Help
Post: RE: MD5 Help

Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities. These guys at www.onlinehashcrack.c...
DanielG hashcat 4 1,655 10-21-2019, 08:51 AM
    Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing

Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788
DanielG User Contributions 4 2,759 03-04-2020, 10:10 AM
    Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt

First step is to have a test password that you know so you can test your hypothesis. Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex...
DanielG hashcat 4 1,108 03-19-2020, 04:14 PM
    Thread: [sha256] Hash inside a hash
Post: RE: [sha256] Hash inside a hash

There are 2^256 possible SHA256 hashes, this is about 10^77 possibilities. There are about 10^80 atoms in the whole observable universe. You will need more than "haha like 1tera?", it's more like "hah...
DanielG hashcat 5 3,758 11-29-2017, 04:09 PM
    Thread: Tesla P100 / HC 4.1.0 Benchmarks on Google Cloud
Post: RE: Tesla P100 / HC 4.1.0 Benchmarks on Google Clo...

Cool results, tnx!
DanielG Hardware 5 6,940 04-13-2018, 11:26 AM
    Thread: NTLM password not found
Post: RE: NTLM password not found

Using https://tobtu.com/lmntlm.php I can turn František1 into the NTLM hash 902BD6FDDF5248CE7902174E408F3F1F which means your NTLM-hash is correct. You also say you used ?b?b which did not lead...
DanielG hashcat 5 4,033 04-30-2018, 02:17 PM
    Thread: NTLM password not found
Post: RE: NTLM password not found

Shouldn't this then work?: ./hashcat -a 3 -m 1000 --hex-charset 902BD6FDDF5248CE7902174E408F3F1F 4600720061006e0074006900?b?b65006b003100 ./hashcat -a 3 -m 1000 --hex-charset 902BD6FDDF5248CE7902174...
DanielG hashcat 5 4,033 05-01-2018, 11:32 AM
    Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?

Having never used Adobe Experience Manager, I googled and saw on https://experience-aem.blogspot.nl/2014/02/aem-cq-56-useful-tips-for-debugging.html that you can change the hashing from SHA-256 to SHA...
DanielG hashcat 5 5,004 05-01-2018, 03:37 PM
    Thread: Nexus 5X PIN question
Post: RE: Nexus 5X PIN question

I think you must specify if the salt is in hex format with --hex-salt, also you seem to be using --force. That option might mask an error preventing you from successfully brute forcing this.
DanielG hashcat 5 3,376 06-06-2018, 08:44 AM
    Thread: Nexus 5X PIN question
Post: RE: Nexus 5X PIN question

Are you sure that the Nexus 5X stores the pin in the simple format "md5(pin + salt)"? For example I read about a Samsung phone that it is stored very differently on https://hashcat.net/forum/thread-22...
DanielG hashcat 5 3,376 06-07-2018, 09:03 AM
    Thread: How to crack AEM/CQ sha256 hash?
Post: RE: How to crack AEM/CQ sha256 hash?

I tried the following schemes (with different iterations), but no luck: most likely, sha_265(salt+password) then rehash the hash 1000 times most likely too, sha_265(password+salt) then rehash the ...
DanielG hashcat 5 5,004 05-01-2018, 04:22 PM
    Thread: 2080ti $Bitcoin$ hashrate
Post: RE: 2080ti $Bitcoin$ hashrate

Kulahin Wrote: (10-14-2018, 02:34 PM) -- What do you think about this hashrate -- It is a good hashrate for your card, which you did not mention. Lol I'm blind, it's in the title.
DanielG Hardware 5 4,357 10-15-2018, 08:06 AM
    Thread: hashcat recovers null results
Post: RE: hashcat recovers null results

Just to be really really sure, if you do sha512($salt) on for example https://passwordsgenerator.net/sha512-hash-generator/ you don't get the hash in your output?
DanielG General Talk 5 3,251 11-05-2018, 05:25 PM
    Thread: hashcat recovers null results
Post: RE: hashcat recovers null results

That hashcat is correctly showing the results. There is no password for those hashes you have, only a salt. Depending on your source this might be logical.
DanielG General Talk 5 3,251 11-05-2018, 05:52 PM
    Thread: Parsing a Potfile
Post: RE: Parsing a Potfile

just open the file in a text editor? The format is just hash:plain. Just did it on a Hashcat v4.2.1 I have locally: Code: -- > cat .hashcat/hashcat.potfile d0763edaa9d9bd2a9516280e9044d885:monkey -...
DanielG hashcat 5 3,833 12-11-2018, 03:23 PM
    Thread: can't supress error messages in a txt
Post: RE: can't supress error messages in a txt

Maybe you could explain *why* you want to do it. Maybe there is a different way to get what you really want without having to suppress errors. This line of questioning sound a bit like a https://xyprob...
DanielG hashcat 5 2,705 05-02-2019, 02:00 PM
    Thread: Can you resume if HC crashes?
Post: RE: Can you resume if HC crashes?

just type the AT, so AT?u?u?u?u?u?u
DanielG hashcat 5 1,762 08-13-2019, 01:31 PM
    Thread: Advice for Reviving Old Machine for Hashcat
Post: RE: Advice for Reviving Old Machine for Hashcat

Before buying hardware make sure cracking is feasible. What do you know about the password for the truecrypt container? If you only know it is 20 characters for example you will never crack it. But if...
DanielG hashcat 5 1,621 12-12-2019, 10:33 AM
    Thread: why the Alphabetic charset is so slow
Post: RE: why the Alphabetic charset is so slow

Ulfr11 Wrote: (02-27-2020, 04:36 AM) -- ?h is much faster mask than ?a in brute Force attacks -- Yes, counting to 10 is faster than counting to 100.
DanielG hashcat 5 1,805 02-27-2020, 02:48 PM