Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post [desc] Author Forum Replies Views Posted
    Thread: MD5 mask for password
Post: RE: MD5 mask for password

3.4028237e+38 seems like an awful lot of combinations.
plaverty9 hashcat 3 2,958 06-27-2018, 05:42 PM
    Thread: Need piping?
Post: RE: Need piping?

royce Wrote: (11-08-2018, 12:07 AM) -- You can mix and match as needed - part rules, part external. A pure-rules approach will be fastest. -- Do I need to write 10,000 rules for the 0000 to 9999? I...
plaverty9 hashcat 3 2,204 11-08-2018, 12:12 AM
    Thread: New to Hashcat, command starts and then stops after a few seconds
Post: RE: New to Hashcat, command starts and then stops ...

andross Wrote: (07-01-2018, 07:04 AM) -- I don't know why it would be saying that because there is no way it tried all 1,4344,382 phrases in my word list against 6 hashes. -- Your output shows:  ...
plaverty9 hashcat 9 7,044 07-01-2018, 04:14 PM
    Thread: New to Hashcat, command starts and then stops after a few seconds
Post: RE: New to Hashcat, command starts and then stops ...

I guess that's a valid option too.
plaverty9 hashcat 9 7,044 07-02-2018, 02:29 AM
    Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help

hashcat -a3 -m -1 ?d?u ?1?1?1?1?1?1?1?1?1?1  The -1 says to use a custom charset and the charset we are using is only digits (?d) and uppercase (?u) Then we use the ?1 10 times because you said t...
plaverty9 hashcat 16 9,771 05-07-2018, 04:13 PM
    Thread: [ANSWERED] New user, custom brute force help
Post: RE: New user, custom brute force help

AaronKek Wrote: (05-10-2018, 07:47 PM) -- What would the "-m" be then? -- Depends on the hash you're trying to crack. Use this to find it: https://hashcat.net/wiki/doku.php?id=example_hashes
plaverty9 hashcat 16 9,771 05-10-2018, 08:09 PM
    Thread: Parameters for crack ETH wallet password
Post: RE: Parameters for crack ETH wallet password

hashcat64.exe -m15700 -1 gG ?1?1?d?d?d?d?d?d?d?1?1 -a3 -w4 -O If the password is formatted like you suggested, that should crack pretty quickly. It says to test the first two and last two character...
plaverty9 hashcat 4 3,247 09-30-2018, 03:43 AM
    Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce

Yep, use attack mode 3 and then your guess and then a mask. So if you need 7-10 more chars, you can do: -a3 guess?a?a?a?a?a?a?a?a?a?a?a --increment --increment-minimum=7 But if you don't know ...
plaverty9 hashcat 5 4,162 05-22-2018, 04:13 PM
    Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce

Yep, use: -a3 -1 ?u?l?d guess?1?1?1?1?1?1?1?1?1?1 --increment --increment-minimum=7 But seriously, it could take years. The more characters you can remember, the shorter it'll be.
plaverty9 hashcat 5 4,162 05-22-2018, 04:52 PM
    Thread: Prepend phrase + bruteforce
Post: RE: Prepend phrase + bruteforce

WhalingWizard Wrote: (05-22-2018, 05:07 PM) -- plaverty9 Wrote: (05-22-2018, 04:52 PM) -- Yep, use: -a3 -1 ?u?l?d guess?1?1?1?1?1?1?1?1?1?1 --increment --increment-minimum=7 But seriously, i...
plaverty9 hashcat 5 4,162 05-23-2018, 05:26 PM
    Thread: Problem with sha-256 crack
Post: RE: Problem with sha-256 crack

This seems relevant to what you're dealing with: https://github.com/hashcat/hashcat/issues/1467
plaverty9 hashcat 6 3,828 06-11-2018, 07:07 PM
    Thread: Problem with sha-256 crack
Post: RE: Problem with sha-256 crack

I think what undeath was trying to say is "yes", it'll take a long time. Look at what it's trying to guess: First six have a keyspace of 36 each Next two have a keyspace of 33 each Last six have...
plaverty9 hashcat 6 3,828 06-11-2018, 08:10 PM
    Thread: Rule-based Attack
Post: RE: Rule-based Attack

To your original question: "I'd like to carry out a rule-based attack where the password should have: - capitalise first character - append from one to four digits to the end - append a special c...
plaverty9 hashcat 9 5,660 06-27-2018, 05:10 PM
    Thread: Run 3 opencl devices at once
Post: RE: Run 3 opencl devices at once

What are you trying to do?
plaverty9 hashcat 8 4,128 11-10-2018, 07:22 PM
    Thread: show.log
Post: RE: show.log

Yeah, it's pretty weird that it keeps getting created. I didn't even know about the --session flag. Also one time when trying to show, I got an error that I didn't have permission to my show.log file,...
plaverty9 hashcat 6 3,646 05-28-2018, 02:00 PM
    Thread: show.log
Post: RE: show.log

Thanks Royce, that's my confusion too. I use a hashcat server for my job and the server admin just asked why I keep creating show.log files, which I don't even know how to create them. I'll try to fig...
plaverty9 hashcat 6 3,646 05-24-2018, 02:32 PM
    Thread: show.log
Post: RE: show.log

Sure. I simply run hashcat -m1000 --show --username --potfile-path potfile and that generates a show.log file in my hashcat directory. The contents of the show.log file look like it's debugging or...
plaverty9 hashcat 6 3,646 05-25-2018, 09:35 PM
    Thread: Weird estimated time
Post: RE: Weird estimated time

starkkh Wrote: (06-05-2018, 04:36 AM) -- Hi everybody , Anytime I want to run a brute force attack with masks or a rule based attack I have really really long estimated time now I just tried anot...
plaverty9 hashcat 5 3,464 06-05-2018, 04:01 PM
    Thread: What is the hashcat rule to append numbers from 0 to 9999 at the end?
Post: RE: What is the hashcat rule to append numbers fro...

What atom said but also add --increment to get every number from 0 to 9999
plaverty9 hashcat 3 3,183 07-24-2018, 02:31 PM
    Thread: show.log
Post: show.log

I'm noticing that a file named show.log is being created on my server, even though I don't intend for it. Does that get created any time I use --show or is there some other combination of flags making...
plaverty9 hashcat 6 3,646 05-23-2018, 07:43 PM