Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: TOTP brute-force search incomplete?
Post: RE: TOTP brute-force search incomplete?

I think it has to do that a single kernel call can't crack a hash multiple times. There are just way too many collisions for a fast cracker like hashcat. I think a similar problem/limitation/restri...
philsmd hashcat 4 851 06-19-2020, 06:24 PM
    Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force

it's a very special situation, which requires either a special password generator or a compromise to allow some duplicates for better speed. The candidate generator could be as simple as this: Co...
philsmd hashcat 7 1,442 06-19-2020, 06:06 PM
    Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force

it's negligible. the more words, the less likely is that a word occurs multiple times. As said, you could develop a fast password candidate generator that does all that fancy stuff: combining, conc...
philsmd hashcat 7 1,442 06-19-2020, 05:31 PM
    Thread: Rules doesn't work.
Post: RE: Rules doesn't work.

I can't give any advice about the other tools, but my recommendation is that you just should learn how hashcat works and the hashcat rules etc (see wiki, https://hashcat.net/wiki/) and just focus on h...
philsmd hashcat 1 479 06-19-2020, 05:23 PM
    Thread: Blockchain Wallet
Post: RE: Blockchain Wallet

oh, this is actually interesting that the support team is offering you to kind of spam them with login requests. My guess is that there will still be a limit, it might just be a little bit larger (for...
philsmd hashcat 6 1,279 06-19-2020, 09:12 AM
    Thread: Truecrypt
Post: RE: Truecrypt

What do you mean by "I'm now able to run the attack" ? Are you able to crack hashes that you have generated as a test ? Did you try to crack the example hash from https://hashcat.net/wiki/example_h...
philsmd General Talk 10 2,590 06-18-2020, 12:50 PM
    Thread: -m 2500 hccapx works on hashcat-5.1.0+1831 but not 6.0
Post: RE: -m 2500 hccapx works on hashcat-5.1.0+1831 but...

what's your command ? do you use -m 2500 in the command line ?
philsmd hashcat 1 482 06-17-2020, 10:05 PM
    Thread: Multiple wordlist with brute force
Post: RE: Multiple wordlist with brute force

it's always clever to step back a little bit and first try to understand and analyse the feasibility of this attack and the total keyspace. My guess is that this is for WPA "hashes", so it's alread...
philsmd hashcat 7 1,442 06-17-2020, 07:17 PM
    Thread: Restoring a WPA session from hashcat 5.1.0 in 6.0.0?
Post: RE: Restoring a WPA session from hashcat 5.1.0 in ...

You could be lucky since the data itself that is stored was not changed directly (actually never changed for years, exactly for "compatibility reasons"... but see reason for updated versoin below), se...
philsmd hashcat 2 664 06-17-2020, 03:08 PM
    Thread: Blockchain Wallet
Post: RE: Blockchain Wallet

my guess is that you already should have a backup of your JSON file downloaded beforehand, ready to be used for recovery and saved to your disk ? If you didn't make any backups and don't have any fil...
philsmd hashcat 6 1,279 06-17-2020, 01:00 PM
    Thread: €-Symbol with Command ?b
Post: RE: €-Symbol with Command ?b

That's actually the funny and at the same time very difficult part of encoding. the euro sign € can be also represented by just one byte in other encodings for instance ISO8859-15 has 0xa4 as a cur...
philsmd hashcat 4 809 06-16-2020, 10:06 PM
    Thread: Hashcat don't find my password
Post: RE: Hashcat don't find my password

you could try with latest beta version : https://hashcat.net/beta/ never use --self-test-disable , because it just ignores every sanity check and therefore you are basically ignoring the serious er...
philsmd hashcat 4 877 06-16-2020, 02:52 PM
    Thread: DES with partial plain text
Post: RE: DES with partial plain text

yeah, it could work... but also the kernel would need to loop over these 256*256 combinations (16 bits) = 65536 which of course would imply a kernel runtime of 65536 times longer :( That means h...
philsmd hashcat 11 1,633 06-15-2020, 11:54 AM
    Thread: hashcat -b is not seeing my grahpic card
Post: RE: hashcat -b is not seeing my grahpic card

follow this: https://hashcat.net/faq/wrongdriver and install the driver directly from https://nvidia.com
philsmd hashcat 4 892 06-15-2020, 11:33 AM
    Thread: Generator of fortune
Post: RE: Generator of fortune

what's going on here? one (actually 2) completely new forum accounts without any previous posts suddently talking about a tool with very strange description and furthermore a tool that was already con...
philsmd User Contributions 8 2,022 06-15-2020, 11:06 AM
    Thread: DES with partial plain text
Post: RE: DES with partial plain text

yeah, that would work, you just generate the set of hashes with different right part ("salt" aka ciphertext) and try to crack those hashes. In theory it shouldn't be 65536 if the plaintext wasn't rand...
philsmd hashcat 11 1,633 06-15-2020, 09:15 AM
    Thread: DES with partial plain text
Post: RE: DES with partial plain text

now you are confusing ciphertext and plaintext the format of -m 14000 hashes is 8_bytes_ciphertext_in_hex:8_bytes_plaintext_in_hex
philsmd hashcat 11 1,633 06-15-2020, 09:02 AM
    Thread: Truecrypt
Post: RE: Truecrypt

just one simple thing you could and should do. create a similar container with known password (it could be similar to the one you are trying to crack, just remember always that this is just a test and...
philsmd General Talk 10 2,590 06-15-2020, 08:52 AM
    Thread: DES with partial plain text
Post: RE: DES with partial plain text

so you know exactly 4 "bytes" of 8 bytes of the key ? (just remember that of the 8 "bytes" == 8 * 8 bits = 64 bits, 8 of them are parity bits, therefore it's 8*8 - 8 = 64 bits - 8 bits = 56 bits). we ...
philsmd hashcat 11 1,633 06-15-2020, 08:39 AM
    Thread: DES with partial plain text
Post: RE: DES with partial plain text

for -m 14000 = DES (PT = $salt, key = $pass) the "plain text" is the salt and the password is the encryption key Therefore, with unknown plain text the "hash" would change or you would need to l...
philsmd hashcat 11 1,633 06-14-2020, 11:00 PM