Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [asc] Views Posted
    Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce

Yep, use: -a3 -1 ?u?l?d guess?1?1?1?1?1?1?1?1?1?1 --increment --increment-minimum=7 But seriously, it could take years. The more characters you can remember, the shorter it'll be.
plaverty9 hashcat 5 4,162 05-22-2018, 04:52 PM
    Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce

WhalingWizard Wrote: (05-22-2018, 05:07 PM) -- plaverty9 Wrote: (05-22-2018, 04:52 PM) -- Yep, use: -a3 -1 ?u?l?d guess?1?1?1?1?1?1?1?1?1?1 --increment --increment-minimum=7 But seriously, i...
plaverty9 hashcat 5 4,162 05-23-2018, 05:26 PM
    Thread: Weird estimated time
Post: RE: Weird estimated time

starkkh Wrote: (06-05-2018, 04:36 AM) -- Hi everybody , Anytime I want to run a brute force attack with masks or a rule based attack I have really really long estimated time now I just tried anot...
plaverty9 hashcat 5 3,464 06-05-2018, 04:01 PM
    Thread: Launch hashcat with conrete letters in password counts
Post: RE: Launch hashcat with conrete letters in passwor...

I'd do that anyway. It should be fast. 7 chars with a keyspace of 3 should be super fast.
plaverty9 hashcat 5 3,289 07-06-2018, 04:48 PM
    Thread: Launch hashcat with conrete letters in password counts
Post: RE: Launch hashcat with conrete letters in passwor...

Yes, but longer or bigger charsets are a different case than what you asked about. You asked about a length of 7 and a character set of 3. I'd brute that. If you have longer passwords with a bigger ch...
plaverty9 hashcat 5 3,289 07-06-2018, 07:04 PM
    Thread: Parameters for crack ETH wallet password
Post: RE: Parameters for crack ETH wallet password

hashcat64.exe -m15700 -1 gG ?1?1?d?d?d?d?d?d?d?1?1 -a3 -w4 -O If the password is formatted like you suggested, that should crack pretty quickly. It says to test the first two and last two character...
plaverty9 hashcat 4 3,247 09-30-2018, 03:43 AM
    Thread: how to set mask
Post: RE: how to set mask

For each character that you think is a digit, use ?d. If you know parts of it, you can feed that in. Using your example, you can use: 200002?d?d?d?d?d?d?d?d?d2018053019184400100426 But you'll need...
plaverty9 hashcat 3 2,640 06-02-2018, 12:44 PM
    Thread: how to set mask
Post: RE: how to set mask

If you don't know the order then yes, you'll need to try all of them, which I think might take a really long time, especially if you don't know how many characters are missing. If you know how many ch...
plaverty9 hashcat 3 2,640 06-06-2018, 02:51 PM
    Thread: MD5 mask for password
Post: RE: MD5 mask for password

3.4028237e+38 seems like an awful lot of combinations.
plaverty9 hashcat 3 2,958 06-27-2018, 05:42 PM
    Thread: What is the hashcat rule to append numbers from 0 to 9999 at the end?
Post: RE: What is the hashcat rule to append numbers fro...

What atom said but also add --increment to get every number from 0 to 9999
plaverty9 hashcat 3 3,183 07-24-2018, 02:31 PM
    Thread: help with sha256
Post: RE: help with sha256

You used a wordlist instead of a mask. If it's exhausted, this means the password is not in the rockyou list. You can run rules on the rockyou wordlist, which might help. Do the same crack as you did ...
plaverty9 hashcat 3 2,527 08-16-2018, 08:07 PM
    Thread: help with sha256
Post: RE: help with sha256

If you know what mask matches, or will crack it, you can add -a3 and then add the specific mask that you want to use, drop the rules and drop the wordlist.
plaverty9 hashcat 3 2,527 08-16-2018, 08:08 PM
    Thread: Need piping?
Post: Need piping?

We want to uppercase each word in the wordlist and append four digits to the end. So it seems our options are to create 10,000 $X rules with c or is the only other option to run them one at a time and...
plaverty9 hashcat 3 2,204 11-08-2018, 12:04 AM
    Thread: Need piping?
Post: RE: Need piping?

royce Wrote: (11-08-2018, 12:07 AM) -- You can mix and match as needed - part rules, part external. A pure-rules approach will be fastest. -- Do I need to write 10,000 rules for the 0000 to 9999? I...
plaverty9 hashcat 3 2,204 11-08-2018, 12:12 AM
    Thread: insert a character after each character
Post: insert a character after each character

I'm reading https://hashcat.net/wiki/doku.php?id=rule_based_attack and I see ipX, which seems kind of what I want, but I want to be able to tell it to do it after every character. Do I just need to w...
plaverty9 General Talk 2 2,527 05-10-2018, 06:54 AM
    Thread: keep-guessing + rules?
Post: RE: keep-guessing + rules?

I kinda feel like that if you don't know the answer to something that it is likely unknowable.
plaverty9 hashcat 2 2,178 06-18-2018, 10:54 PM
    Thread: Can`t find NTLMv2 Hash
Post: RE: Can`t find NTLMv2 Hash

In my experience, when I capture an NTLMv2 hash, the output explicitly says that. So maybe you're not capturing them?
plaverty9 hashcat 2 2,358 06-26-2018, 08:32 PM
    Thread: Learn Next?
Post: Learn Next?

Once someone has gotten up to speed on the basics of hashcat, like using various rules/wordlists, playing with masks, finding that ones that seem to work best, what would you suggest that a noob learn...
plaverty9 hashcat 2 2,034 07-06-2018, 08:27 PM
    Thread: Learn Next?
Post: RE: Learn Next?

Awesome. Thank you Royce. And you're right about the emerging patterns. I'm really enjoying "discovering" which masks work best for me. As an example, I just ran a data set of 137,000 passwords I've r...
plaverty9 hashcat 2 2,034 07-06-2018, 08:44 PM
    Thread: Bruteforce mode / pw length
Post: RE: Bruteforce mode / pw length

fernando Wrote: (05-10-2018, 07:50 PM) -- Hi. Is there a way to run hashcat in a bruteforce mode with a specified minimum password length? -- Yes, check out the increment and increment minimum ...
plaverty9 hashcat 1 2,076 05-10-2018, 08:02 PM