Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Using hashcat (GPU) with simple hash function
Post: RE: Using hashcat (GPU) with simple hash function

Okay, I tried to run this code locally and there is indeed a bug if I take the code you posted literally. The code Code: -- hash += (s[i] * s[i] * s[i] * s[i] * s[i]); -- does not produce the c...
DanielG hashcat 4 1,951 07-10-2019, 09:38 AM
    Thread: Looking to rent GPU Server 4 hashcat.
Post: RE: Looking to rent GPU Server 4 hashcat.

"hour how much time would i need on 10x 1080... for 8 char ?a or 10 ?a brute" Let's calculate this: Hashcat supports these: -m 11300 = Bitcoin/Litecoin wallet.dat -m 12700 = Blockchain, My Wal...
DanielG Hardware 4 4,071 07-12-2019, 11:10 AM
    Thread: 2x32 Bytes in base64, separated by $
Post: RE: 2x32 Bytes in base64, separated by $

Cool, nice way you found that out too
DanielG General Talk 4 1,671 09-25-2019, 09:17 AM
    Thread: MD5 Help
Post: RE: MD5 Help

Just forget about even trying is a good strategy if you only have a hash and know the plaintext is 16^32 (340282366920938463463374607431768211456) possibilities. These guys at www.onlinehashcrack.c...
DanielG hashcat 4 1,655 10-21-2019, 08:51 AM
    Thread: NTLMv1 to NTLM Reversing
Post: RE: NTLMv1 to NTLM Reversing

Also check out https://crack.sh/netntlm/, they crack NTLMv1 to NTLM for free fast if you set responder to the static challenge of 1122334455667788
DanielG User Contributions 4 2,758 03-04-2020, 10:10 AM
    Thread: Hash Mode request MS SQL 2016 with salt
Post: RE: Hash Mode request MS SQL 2016 with salt

First step is to have a test password that you know so you can test your hypothesis. Mine is: The password base-64 decodes to 160 bit of data, the same length as a SHA1 hash. The salt looks like hex...
DanielG hashcat 4 1,105 03-19-2020, 04:14 PM
    Thread: Line-length exception?
Post: RE: Line-length exception?

You are setting -t (--markov-threshold Threshold X when to stop accepting new markov-chains) to 500, you probably want -m 500 (-m, --hash-type) to 500 which is md5crypt, MD5 (Unix), Cisco-IOS $1$ (MD5...
DanielG General Talk 3 4,747 12-29-2017, 08:40 AM
    Thread: Just a little issue, hoping for some support
Post: RE: Just a little issue, hoping for some support

Would be nice to know the results of your "reading up and down for over an hour, on diff sites and forums". Because you're bound to get suggestions that you already saw in your hours of research but d...
DanielG hashcat 3 2,824 01-02-2018, 12:24 PM
    Thread: aes128 brute-force w/mask using half sha256
Post: RE: aes128 brute-force w/mask using half sha256

If you only have half a SHA256 hash I think you would need to edit the m01400* files (SHA256) to do something similar as the m05100* files (Half MD5) on https://github.com/hashcat/hashcat/tree/mast...
DanielG hashcat 3 4,106 01-09-2018, 03:22 PM
    Thread: Error while running hashcat: llvm_codegen: Assertion error == 0 failed...
Post: RE: Error while running hashcat: llvm_codegen: As...

Several google results regarding the error llvm_codegen: Assertion 'error == 0' failed indicate that installing 'clang' resolved this. Quote: -- sudo apt-get install clang-3.8 --
DanielG hashcat 3 3,845 01-16-2018, 04:07 PM
    Thread: HELP, need a mask example
Post: RE: HELP, need a mask example

rasoulcarrera Wrote: (01-31-2018, 12:45 PM) -- nope ,seen it and nothing -- It literally says on https://hashcat.net/wiki/doku.php?id=mask_attack#example  Built-in charsets ?l = abcdefghijkl...
DanielG hashcat-utils, maskprocessor, statsprocessor, md5stress, wikistrip 3 4,041 01-31-2018, 02:18 PM
    Thread: cracking password with part of it knowm
Post: RE: cracking password with part of it knowm

Big question is why are you using "--force", maybe it has to do with the error you are suppressing. What is your entire output when not using "--force"?
DanielG hashcat 3 3,764 04-09-2018, 08:52 AM
    Thread: Disable Cracking performance lower than expected?
Post: RE: Disable Cracking performance lower than expect...

yeah, get the source code off github, change the part of the code that does that, compile hashcat, no more message.
DanielG hashcat 3 3,345 07-29-2018, 01:13 PM
    Thread: error v4.1.0
Post: RE: error v4.1.0

Is it also possible that hashcat has been extracted to a folder where an admin has rights but a user does not? So if you unzip hashcat using Admin account but start command prompt using normal user ac...
DanielG hashcat 3 3,216 08-01-2018, 05:06 PM
    Thread: Help identifying this hash
Post: RE: Help identifying this hash

You mention AspNetUsers which lead me to https://msdn.microsoft.com/en-us/magazine/dn818488.aspx. This mentions that next to the passwordhash a SecurityStamp GUID is stored. The part you posted after ...
DanielG General Talk 3 2,852 08-20-2018, 08:51 AM
    Thread: Please, help identifying hash type
Post: RE: Please, help identifying hash type

It would help to tell us where you got the hash from, it saves us searching for it and discovering it is a HP Switch config password. On https://h20628.www2.hp.com/km-ext/kmcsdirect/emr_na-c04149503-1....
DanielG General Talk 3 2,806 09-06-2018, 09:08 AM
    Thread: Need help with inputs
Post: RE: Need help with inputs

You don't want to do this. Assuming your command will work, length 64 brute force with a-z 0-9 is not going to work. Let's find out why: Let's assume you have 149,000$ and buy a 8 NVIDIA Tesla...
DanielG hashcat 3 2,248 09-28-2018, 02:27 PM
    Thread: Need help with inputs
Post: RE: Need help with inputs

No problem, for the rest of the technical questions you can try https://hashcat.net/wiki/doku.php?id=mask_attack and https://hashcat.net/wiki/doku.php?id=hashcat for the correct commandline options. I...
DanielG hashcat 3 2,248 09-28-2018, 03:40 PM
    Thread: My KeePass Job Seems Slow
Post: RE: My KeePass Job Seems Slow

This looks like exactly as the reason why password tools (like Keepass) use the algorithms they use. You should be slow at brute-forcing it, that's the point. I made a Keepass file with 100000 rounds ...
DanielG hashcat 3 2,010 10-29-2018, 12:14 PM
    Thread: md5(base64_encode($pass)) in hashcat
Post: RE: md5(base64_encode($pass)) in hashcat

https://github.com/hashcat/hashcat/tree/master/OpenCL read, learn, edit, use
DanielG hashcat 3 2,374 10-30-2018, 12:52 PM