Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [desc]
    Thread: cuCtxCreate(): unknown error
Post: RE: cuCtxCreate(): unknown error

try this: https://hashcat.net/faq/wrongdriver which version of hashcat do you use ? does it work with --backend-ignore-cuda or without CUDA installed ?
philsmd hashcat 3 302 09-23-2020, 05:56 PM
    Thread: Problems with the program after compilation
Post: RE: Problems with the program after compilation

try with -D 1 and https://hashcat.net/faq/wrongdriver
philsmd hashcat 2 294 09-23-2020, 10:38 PM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

yeah, good that you guys pinpointed it. I didn't really look at the hash type, because thought you were just looking for the file in general. Yeah, but it already works like this since several year...
philsmd hashcat 14 1,235 09-24-2020, 07:42 PM
    Thread: Mode 11300
Post: RE: Mode 11300

the padding is known, we exploit this (padding attack, last few bytes 16 or 8 depending on the wallet type): https://github.com/hashcat/hashcat/blob/3dd89bc63c2614b57db58bd7b05d2d61dcc5ab75/OpenCL/...
philsmd hashcat 1 251 09-24-2020, 10:17 PM
    Thread: 6.1.1 potfile
Post: RE: 6.1.1 potfile

Code: -- hashcat -m 6211 -a 3 -w 3 -o cracked.txt -i container.tc ?b?b?b --
philsmd hashcat 14 1,235 09-24-2020, 11:07 PM
    Thread: tips on cracking SHA1 hash
Post: RE: tips on cracking SHA1 hash

Code: -- -a 7 -1 ?u?d hash.txt ?1 dict.txt -- or rules: Code: -- -a 0 -r my.rules hash.txt dict.txt -- where my.rules is Code: -- ^0 ^1 ^2 ^3 ^4 ^5 ^6 ^7 ^8 ^9 ^A ^B ^C...
philsmd hashcat 3 396 09-24-2020, 11:11 PM
    Thread: -m 22600 Hashcat how extract hash?
Post: RE: -m 22600 Hashcat how extract hash?

first of all, most of the extraction tools now require python 3 as you can see also here: Code: -- #!/usr/bin/env python3 -- (from https://github.com/openwall/john/blob/bleeding-jumbo/run/telegr...
philsmd hashcat 3 338 09-29-2020, 11:41 AM
    Thread: New Attack-Mode: Association Attack
Post: RE: New Attack-Mode: Association Attack

as far as I understood it, you would need to specify more files or a folder instead. Code: -- hashcat -m 3200 -a 9 hash.txt dict_*.txt -- or Code: -- hashcat -m 3200 -a 9 hash.txt dicts/...
philsmd Beta Tester 21 3,761 09-29-2020, 07:22 PM
    Thread: -m 22600 Hashcat how extract hash?
Post: RE: -m 22600 Hashcat how extract hash?

I would suggest that if you are 100% sure that you are doing everything correctly, you should report the problem to John The Ripper (which develop the telegram2john.py tool) and try to investigate mor...
philsmd hashcat 3 338 09-30-2020, 11:41 AM
    Thread: 4.6million character hash rar file
Post: RE: 4.6million character hash rar file

First of all, it would always make sense to post the hash type that you are trying to crack, also see https://hashcat.net/wiki/example_hashes . latest beta version of hashcat (https://hashcat.net/bet...
philsmd hashcat 2 340 10-02-2020, 02:52 PM
    Thread: Hashcat exhausted
Post: RE: Hashcat exhausted

The word list "rockyou.txt" doesn't contain the password "hashcat" (without quotes). I don't see any evidence that your claim about a problem and that the password is within the dictionary file is ...
philsmd hashcat 2 208 10-06-2020, 08:36 AM
    Thread: format username:password?
Post: RE: format username:password?

https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword btw: https://www.techsolvency.com/p...
philsmd hashcat 3 148 Yesterday, 12:31 PM
    Thread: format username:password?
Post: RE: format username:password?

just make sure that the input is correct and also remember that the way to do it is 2-fold (2 steps are needed ), i.e. first crack such that the cracked hashes with password end up in the .potfile, on...
philsmd hashcat 3 148 9 hours ago