Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views [desc] Posted
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Cool, I'm glad to hear it worked. Mind sharing the code / process with DSInternals? I haven't really used it yet but sounds interesting.
DanielG hashcat 11 8,625 01-06-2020, 05:50 PM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

I don't get what your goal is here, any domain admin can change the password of the account so that is your best option. You don't need to crack the NTLM hash for most other 'less-ethical' use cas...
DanielG hashcat 11 8,625 01-03-2020, 09:43 AM
    Thread: Crack Active Directory User NTLM hash
Post: RE: Crack Active Directory User NTLM hash

Thank you!
DanielG hashcat 11 8,625 01-09-2020, 09:48 AM
    Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect

Oh wow, why would they make that choice, using just DES and key "61d0e54954733b80" decodes it indeed (https://gchq.github.io/CyberChef/#recipe=DES_Decrypt(%7B'option':'Hex','string':'61d0e54954733b80'...
DanielG hashcat 10 8,847 06-15-2018, 10:37 AM
    Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect

If they store the passwords locally they seem to use "the strongly secure SHA format"  https://manuals.gfi.com/en/kerio/connect/content/assets/add_user.png https://manuals.gfi.com/en/kerio/connect/...
DanielG hashcat 10 8,847 06-12-2018, 01:05 PM
    Thread: help identify algo from kerio connect
Post: RE: help identify algo from kerio connect

Awesome debugging powers to get that info! Seems to be 3DES indeed with key "61d0e54954733b8080808080808080808080808080808080". Decoding D3S:8742ddf7db1906c5d54ec948c500e587adfa4447eff8dc42adfa4447...
DanielG hashcat 10 8,847 06-15-2018, 09:36 AM
    Thread: Using newline character as part of mask attack
Post: RE: Using newline character as part of mask attack

ajaxdecbe Wrote: -- What is the advantage of using m 20 instead of m 0? -- I also read in another post (trying to find it at the moment) that -m 20 has some optimisations making it slightly faster ...
DanielG hashcat 16 9,677 04-25-2018, 10:48 AM
    Thread: MD5 Help
Post: RE: MD5 Help

Hi, you would probably already be cracking if you followed the information on the wiki (https://hashcat.net/wiki/). Here you can follow the steps needed to crack your hash: https://hashcat.net/wiki/d...
DanielG hashcat 11 12,044 01-09-2018, 05:31 PM
    Thread: MD5 Help
Post: RE: MD5 Help

?1 is indeed how you access the custom charset mentioned. In the example I put 12 "?1" combinations because that is your max length for your password. This makes it easy if you decide to try somethi...
DanielG hashcat 11 12,044 01-11-2018, 10:31 AM
    Thread: Hi guys
Post: RE: Hi guys

You can also just use the "Avatar URL" functionality and use your URL https://a.pomf.cat/dbrbzz.jpg or any other image service host.
DanielG hashcat 18 12,096 04-16-2018, 09:33 AM
    Thread: Hi guys
Post: RE: Hi guys

Make your avatar a PNG file (not jpg), since you are only using 2 colours and simple design it will make it a very small file. If it is below 10K just upload it here, otherwise: Upload your avatar ...
DanielG hashcat 18 12,096 04-16-2018, 11:35 AM
    Thread: Hi guys
Post: RE: Hi guys

Yeah, maybe Atom (https://hashcat.net/forum/user-1.html) disabled this feature recently.
DanielG hashcat 18 12,096 04-17-2018, 10:34 AM
    Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?

Yeah what philsmd said. The wrong login response was just the assumption you intercepted a random person logging in to the system. However the Arabic text after the login attempt says that the log...
DanielG General Talk 27 14,953 02-21-2019, 11:42 AM
    Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?

On https://miloserdov.org/?p=1088 it says the hash 15b4c47a3e0e44b9e40db20ac1225023 is for hexMD5('\301' + "22222222" + '\237\174\357\335\234\211\367\356\273\105\215\277\226\361\103\120') on the scr...
DanielG General Talk 27 14,953 02-19-2019, 02:04 PM
    Thread: how can i crack hexmd5 hash ?
Post: RE: how can i crack hexmd5 hash ?

I think this is going past what hashcat is about and more turning in how you can hack a certain piece of software. You have all the information in this topic (and external sources) to understand inter...
DanielG General Talk 27 14,953 02-22-2019, 10:23 AM
    Thread: cracking salted SHA1
Post: RE: cracking salted SHA1

Your hash should match the formatting used in the Wiki, see https://hashcat.net/wiki/doku.php?id=example_hashes for what a hash for a particular type looks like.
DanielG hashcat 14 19,731 06-28-2018, 04:08 PM
    Thread: OpenCl kernel self-test failed when using any version later than v4.2.1 !!
Post: RE: OpenCl kernel self-test failed when using any ...

https://66.media.tumblr.com/c560849f3c57fc6ed3c0ef57cff43277/tumblr_inline_nkirl9V7Sg1s9de7o.jpg
DanielG hashcat 29 21,222 02-06-2019, 10:38 AM
    Thread: Token length exception
Post: RE: Token length exception

Seeing as you are using -m 1000 it is likely you got a password dump in the format "krbtgt:502:aad3b435b51404eeaad3b435b51404ee:abcdef0123456789abcdef0123456789:::" or "krbtgt:abcdef0123456789abcdef0...
DanielG hashcat 7 23,963 02-14-2019, 10:21 AM
    Thread: hashcat v4.2.0
Post: RE: hashcat v4.2.0

the links are https://hashcat.net/files/hashcat-4.2.0.7z and https://hashcat.net/files/hashcat-4.2.0.tar.gz
DanielG hashcat 10 27,941 08-03-2018, 08:59 AM