Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...

More precisely, this is exactly why these hashes are used for things such as Ethereum Wallets. Because they are sooooo sloooooow.
DanielG hashcat 8 5,504 12-11-2018, 10:15 AM
    Thread: XFX ATI HD 5870 Radeon graphics card 1gb, AMD, PCI-e.
Post: RE: XFX ATI HD 5870 Radeon graphics card 1gb, AMD,...

Also see Atom in https://hashcat.net/forum/thread-6473.html: atom Wrote: (04-09-2017, 08:54 AM) -- The GPU is ways too old, the drivers are outdated. [...] --
DanielG Hardware 9 6,481 03-28-2018, 05:03 PM
    Thread: PDF Hash
Post: RE: PDF Hash

you are using -m 10400, which on https://hashcat.net/wiki/doku.php?id=example_hashes starts with $pdf$1* But your hash starts with $pdf$2* which looks like -m 10500
DanielG hashcat 9 6,364 08-08-2018, 11:29 AM
    Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?

It does show the found password immediately when found: https://i.imgur.com/1kyMkTN.png
DanielG hashcat 9 3,253 09-05-2019, 12:25 PM
    Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password

qpens8 Wrote: (02-08-2018, 03:36 AM) -- Is hashcat storing my pass somewhere? -- https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#what_is_a_potfile
DanielG hashcat 10 7,999 02-08-2018, 10:18 AM
    Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password

Maybe the password is blank (my hashcat finds the same empty password for your posted hash). No password on the PDF file, at least not found by the program making the hash?
DanielG hashcat 10 7,999 02-08-2018, 04:25 PM
    Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax

If your hash (12345678...) is not 32 characters long, then you can get that error. Because that means it is probably not MD5. See https://hashcat.net/wiki/doku.php?id=example_hashes for examples of ho...
DanielG hashcat 10 6,735 03-29-2018, 03:47 PM
    Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax

Okay that is weird, if I make a file hash.txt with d8e8fca2dc0f896fd7cb4cb0031ba249:abcdefghj I get: ./hashcat -m 10 -a 0 hash.txt wordlist.txt [...] Hash 'hash.txt': Line-length exception No ha...
DanielG hashcat 10 6,735 03-29-2018, 03:58 PM
  Wink Thread: Help on hashcat syntax
Post: RE: Help on hashcat syntax

$ ls h* hashcat hashcat.hctune hashcat.potfile  hashcat.dictstat hashcat.log hashcat.potfile.old  hashcat.hcstat hashcat.pot hahs.txt Oh wow just as philsmd says, make sure you don't make ty...
DanielG hashcat 10 6,735 03-29-2018, 04:10 PM
    Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect

Oh wow, why would they make that choice, using just DES and key "61d0e54954733b80" decodes it indeed (https://gchq.github.io/CyberChef/#recipe=DES_Decrypt(%7B'option':'Hex','string':'61d0e54954733b80'...
DanielG hashcat 10 8,847 06-15-2018, 10:37 AM
    Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect

If they store the passwords locally they seem to use "the strongly secure SHA format"  https://manuals.gfi.com/en/kerio/connect/content/assets/add_user.png https://manuals.gfi.com/en/kerio/connect/...
DanielG hashcat 10 8,847 06-12-2018, 01:05 PM
    Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect

Awesome debugging powers to get that info! Seems to be 3DES indeed with key "61d0e54954733b8080808080808080808080808080808080". Decoding D3S:8742ddf7db1906c5d54ec948c500e587adfa4447eff8dc42adfa4447...
DanielG hashcat 10 8,847 06-15-2018, 09:36 AM
    Thread: hashcat v4.2.0
Post: RE: hashcat v4.2.0

the links are https://hashcat.net/files/hashcat-4.2.0.7z and https://hashcat.net/files/hashcat-4.2.0.tar.gz
DanielG hashcat 10 27,941 08-03-2018, 08:59 AM
    Thread: Status: Exhausted Bitcoin Wallet Passphrase Recovery
Post: RE: Status: Exhausted Bitcoin Wallet Passphrase Re...

you are guessing a password of 3 'characters' long. That's only 857375 passwords (kind of like aaa until ~~~). You can guess 1115 hashes per second so in 12 minutes you tried all 3 characters and none...
DanielG hashcat 10 5,905 02-13-2019, 04:40 PM
    Thread: Status: Exhausted Bitcoin Wallet Passphrase Recovery
Post: RE: Status: Exhausted Bitcoin Wallet Passphrase Re...

suhel1986 Wrote: (02-14-2019, 12:07 AM) -- Sorry mate I am not so good at this one, now I got following error, I guessed if the password was 10 to 15 char long I used following command and I got ...
DanielG hashcat 10 5,905 02-14-2019, 10:34 AM
    Thread: MD5 Help
Post: RE: MD5 Help

Hi, you would probably already be cracking if you followed the information on the wiki (https://hashcat.net/wiki/). Here you can follow the steps needed to crack your hash: https://hashcat.net/wiki/d...
DanielG hashcat 11 12,044 01-09-2018, 05:31 PM
    Thread: MD5 Help
Post: RE: MD5 Help

?1 is indeed how you access the custom charset mentioned. In the example I put 12 "?1" combinations because that is your max length for your password. This makes it easy if you decide to try somethi...
DanielG hashcat 11 12,044 01-11-2018, 10:31 AM
    Thread: LM Hashes
Post: RE: LM Hashes

I think you could do 2 things: - the best one is https://hashcat.net/wiki/doku.php?id=hybrid_attack where you make a wordlist with all the variants of PASSWOR (such as Passwor, PAsswor, PaSswor, etc)...
DanielG General Talk 11 5,710 08-27-2019, 08:38 AM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

"My thinking was to crack the old NTLM hash, key it into AD" I think you can change it back without knowing what the old password was. You can set the old NTLM hash with lsadump::ChangeNTLM /server:A...
DanielG hashcat 11 8,625 01-03-2020, 05:19 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting.
DanielG hashcat 11 8,625 01-06-2020, 05:50 PM