Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

I don't get what your goal is here, any domain admin can change the password of the account so that is your best option. You don't need to crack the NTLM hash for most other 'less-ethical' use cas...
DanielG hashcat 11 8,613 01-03-2020, 09:43 AM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

"My thinking was to crack the old NTLM hash, key it into AD" I think you can change it back without knowing what the old password was. You can set the old NTLM hash with lsadump::ChangeNTLM /server:A...
DanielG hashcat 11 8,613 01-03-2020, 05:19 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting.
DanielG hashcat 11 8,613 01-06-2020, 05:50 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Thank you!
DanielG hashcat 11 8,613 01-09-2020, 09:48 AM
    Thread: Crack this hash, win 2 Bitcoins!
Post: RE: Crack this hash, win 2 Bitcoins!

jackisme123 Wrote: (03-21-2018, 02:10 PM) -- My password is not very long, less than 8 digits I believe. -- 1-7 digits = 11111110 possibilities, 400 hashes per second = 7,7 hours. You want to pay...
DanielG hashcat 2 2,806 03-21-2018, 02:25 PM
    Thread: cracking password with part of it knowm
Post: RE: cracking password with part of it knowm

Big question is why are you using "--force", maybe it has to do with the error you are suppressing. What is your entire output when not using "--force"?
DanielG hashcat 3 3,764 04-09-2018, 08:52 AM
    Thread: cracking salted SHA1
Post: RE: cracking salted SHA1

Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like.
DanielG hashcat 14 19,727 06-28-2018, 04:08 PM
    Thread: cryptomator
Post: RE: cryptomator

Looking at https://cryptomator.org/security/architecture/ it looks like it is scrypt which is supported by hashcat: https://hashcat.net/wiki/doku.php?id=example_hashes You will need to figure out...
DanielG hashcat 1 1,695 08-07-2018, 11:01 AM
    Thread: DECRYPTUM
Post: RE: DECRYPTUM

Very cool, what are you using this beast of a machine for? Ah I see it's a commercial device on https://www.decryptum.com/ (https://www.decryptum.com/)
DanielG Hardware 12 1,219 09-16-2020, 10:07 AM
    Thread: Dictionary for long passwords - Tips and ideas
Post: RE: Dictionary for long passwords - Tips and ideas

eriden Wrote: (08-03-2018, 12:10 PM) -- My initial thought was that people using passwords of 16+ characters in length would mostly use pass phrases (I.e. "I love my two dogs!"). So perhaps combinin...
DanielG General Talk 7 6,427 08-03-2018, 12:33 PM
    Thread: Dictionary for long passwords - Tips and ideas
Post: RE: Dictionary for long passwords - Tips and ideas

Unfortunately Cambridge University didn't post it (anywhere I could find), but researchers are nice people so you could try contacting the people in the paper. You could look at https://github.com/...
DanielG General Talk 7 6,427 08-08-2018, 10:36 AM
    Thread: Disable Cracking performance lower than expected?
Post: RE: Disable Cracking performance lower than expect...

yeah, get the source code off github, change the part of the code that does that, compile hashcat, no more message.
DanielG hashcat 3 3,345 07-29-2018, 01:13 PM
    Thread: Easy password with runic
Post: RE: Easy password with runic

Hashcat can bruteforce any input bytes, so theoretically yes.
DanielG hashcat 6 3,550 07-27-2018, 09:58 AM
    Thread: Easy password with runic
Post: RE: Easy password with runic

The brute-force attack mode (https://hashcat.net/wiki/doku.php?id=mask_attack) allows the use of ?b which are all the bytes 0x00 through 0xff. So that would be a way, although probably very ineffici...
DanielG hashcat 6 3,550 07-27-2018, 10:19 AM
    Thread: error v4.1.0
Post: RE: error v4.1.0

Is it also possible that hashcat has been extracted to a folder where an admin has rights but a user does not? So if you unzip hashcat using Admin account but start command prompt using normal user ac...
DanielG hashcat 3 3,216 08-01-2018, 05:06 PM
    Thread: Error while running hashcat: llvm_codegen: Assertion error == 0 failed...
Post: RE: Error while running hashcat: llvm_codegen: As...

Several google results regarding the error llvm_codegen: Assertion 'error == 0' failed indicate that installing 'clang' resolved this. Quote: -- sudo apt-get install clang-3.8 --
DanielG hashcat 3 3,845 01-16-2018, 04:07 PM
    Thread: Estimate Time Is Super Slow
Post: RE: Estimate Time Is Super Slow

It is always advised to not use a VM (Virtualbox or otherwise) for hashcat, and not use The-Distribution-Which-Does-Not-Handle-OpenCL-Well (Kali) because of drivers. Also, using a laptop GPU to much...
DanielG hashcat 18 8,556 01-15-2019, 05:19 PM
    Thread: Ethereum Wallet and 2x 1080ti what's the problem?
Post: RE: Ethereum Wallet and 2x 1080ti what's the probl...

More precisely, this is exactly why these hashes are used for things such as Ethereum Wallets. Because they are sooooo sloooooow.
DanielG hashcat 8 5,504 12-11-2018, 10:15 AM
    Thread: Found a password - Recovered ?
Post: RE: Found a password - Recovered ?

It does show the found password immediately when found: https://i.imgur.com/1kyMkTN.png
DanielG hashcat 9 3,253 09-05-2019, 12:25 PM
    Thread: GTX 1080 Bitcoin Core Performance
Post: RE: GTX 1080 Bitcoin Core Performance

10 length only numbers and letters (uppercase and lowercase) = 10^62 / 4508 per second = 7 × 10^50 years 10 length only numbers and letters (uppercase or lowercase) = 10^36 / 4508  per second  =...
DanielG General Talk 6 5,114 01-02-2018, 02:21 PM