Please note, this is a STATIC archive of website hashcat.net from October 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author [asc] Forum Replies Views Posted
    Thread: 4 Way Handshake
Post: RE: 4 Way Handshake

> I'm using windows. Nope*. * Unless you use a VM
rico hashcat 3 4,024 07-16-2016, 10:15 PM
    Thread: Resume is broken
Post: RE: Resume is broken

Seems VM routers DO ALLOW repeated characters: https://elmarkodotorg.blogspot.ie/2016/02/virgin-media-routers-arguably-weak.html Password in the screenshot includes "cc". More importantly, the letters...
rico hashcat 24 24,089 07-19-2016, 06:12 PM
    Thread: Resume is broken
Post: RE: Resume is broken

Code: -- -1 abcdefghjklmnpqrstuvwxyz -- This is the charset to use. It's 24 letters long. i and o have been removed. Code: -- --markov-disable -- Not important, leave it out if you want. Goog...
rico hashcat 24 24,089 07-20-2016, 02:32 PM
    Thread: Mask Attack -> Approaching Final Keyspace
Post: RE: Mask Attack -> Approaching Final Keyspace

Not sure what you think the passphrase scheme is but it looks like you're aiming for this mask? Code: -- -1 1234567890 -2 ?d?u?l ?1-?2?2?2?2?2?2?2?2?2?2?2?2 -- A digit, a dash, then 12 chars (di...
rico hashcat 9 14,438 07-21-2016, 12:05 AM
    Thread: Mask Attack -> Approaching Final Keyspace
Post: RE: Mask Attack -> Approaching Final Keyspace

Celare still struggling with the difference between ! and ?
rico hashcat 9 14,438 07-23-2016, 11:42 PM
    Thread: whats the highest or lowest % you got your wpa keys
Post: RE: whats the highest or lowest % you got your wpa...

WPA key found 0.57% through same keyspace. Took less than 2 hours when full keyspace coverage would've taken 2 WEEKS. https://hashcat.net/forum/thread-4637.html
rico General Talk 5 5,405 07-25-2016, 03:48 PM
    Thread: Resume is broken
Post: RE: Resume is broken

Maybe i and o are allowed after all. Or maybe they just changed the default password...
rico hashcat 24 24,089 07-27-2016, 02:40 PM
    Thread: Looking for A Little Push
Post: RE: Looking for A Little Push

You haven't mentioned the hash type though. Each of them have different hash rates, sometimes vastly so. Faster hash rates open up the scope for experimentation (more rules, brute-force, etc.).
rico hashcat 9 10,406 08-24-2016, 12:09 AM
    Thread: Unclear what this hash is from
Post: RE: Unclear what this hash is from

How the hell did you manage to MITM iTunes but not recognise Base64?!
rico hashcat 4 5,479 09-07-2016, 11:51 PM
    Thread: basic help needed
Post: RE: basic help needed

Both answers are in the Options section of --help.
rico hashcat 8 7,910 09-21-2016, 11:14 AM
    Thread: basic help needed
Post: RE: basic help needed

hashcat64.exe --help: Code: --  Options Short / Long     | Type | Description                                     | Example ==========================+===...
rico hashcat 8 7,910 09-21-2016, 12:14 PM
    Thread: How it is possible to decrypt vb?
Post: RE: How it is possible to decrypt vb?

So now try again with 200GB of lists + rules this time.
rico hashcat 7 8,307 09-21-2016, 09:46 PM
    Thread: How it is possible to decrypt vb?
Post: RE: How it is possible to decrypt vb?

Have you even looked at the info on the status screen? How many words in your wordlists? Multiplied by how many rules? At how many hashes per second? Now multiply/divide as appropriate. 5 days ...
rico hashcat 7 8,307 09-22-2016, 04:33 PM
    Thread: Cracking progress ( lass pass attempt)
Post: RE: Cracking progress ( lass pass attempt)

Why are you using mask processor? hashcat can do all this. hashcat32 -m 2500 -a 3 -1 ?dABCDEF T2.hccap ?1?1?1?1?1?1?1?1?1?1 It's going to take a while though....
rico hashcat 5 5,129 09-23-2016, 03:59 PM
    Thread: Cracking progress ( lass pass attempt)
Post: RE: Cracking progress ( lass pass attempt)

1. Determine total keyspace. >hashcat64 -m 2500 -a 3 --keyspace -1 ?dABCDEF T2.hccap ?1?1?1?1?1?1?1?1?1?1 68719476736 2. What position is 00753E0000 in the total keyspace, as a ratio? As this v...
rico hashcat 5 5,129 09-24-2016, 12:26 AM
    Thread: Decrypting usenet headers
Post: RE: Decrypting usenet headers

Somnambulist Wrote: (09-30-2016, 11:30 AM) -- Yes, it's just a md5 IP, so that cracks in under a second with hashcat. -- I'm intrigued. Do tell.
rico hashcat 11 20,400 09-30-2016, 11:05 PM
    Thread: macOS - mask attack doesn't work
Post: RE: macOS - mask attack doesn't work

Code: -- $ ./hashcat -a 3 3c68f35450c4b594072841cfc1c5785f ?l?l?l?l?l?l?l?l hashcat () starting... OpenCL Platform #1: Apple               ========================= - Device #1: Intel(R...
rico hashcat 6 7,494 10-10-2016, 12:14 PM
    Thread: Currency Charsets
Post: RE: Currency Charsets

https://hashcat.net/wiki/doku.php?id=mask_attack#hashcat_charset_files Take a look at the file charsets/standard/English/en_cp1252.hcchr and try it something like this: Code: -- -1 charsets/sta...
rico hashcat 7 8,407 10-17-2016, 10:03 PM
    Thread: Issues running hashcat
Post: RE: Issues running hashcat

Looks good to me. Maybe it's a Sierra thing? This was run on El Capitan 10.11.6 (iMac (21.5-inch, Mid 2011)) Quote: -- $ ./example0.sh hashcat (v3.10-428-g225c682) starting... OpenCL Platform ...
rico hashcat 7 8,004 10-19-2016, 12:28 PM
    Thread: Two different GPUs
Post: RE: Two different GPUs

You absolutely can use different cards together and even include the CPU too (only bother using CPU if the hashrate is worthwhile though). Just don't use SLI.
rico Hardware 6 7,541 12-12-2016, 06:55 PM