Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies Views Posted [asc]
    Thread: Hashcat don't parse sha256($pass.$salt) with --hex-salt
Post: RE: Hashcat don't parse sha256($pass.$salt) with -...

The newest beta version (https://hashcat.net/beta/) should fix this problem. Thx for reporting
philsmd hashcat 3 4,601 09-06-2017, 10:22 PM
    Thread: Hashcat aborting (bug?)
Post: RE: Hashcat aborting (bug?)

You should try again with the latest beta versions of hashcat (https://hashcat.net/beta/ , do not forget to use -O if you want to use the optimized kernels and have the same speed as with 3.6). Rec...
philsmd hashcat 2 2,942 09-05-2017, 02:01 PM
    Thread: Issues in cracking WPA2 with wordlist+mask
Post: RE: Issues in cracking WPA2 with wordlist+mask

The minimum password length for WPA/WPA2 is 8 bytes/characters. Hashcat will immediately reject (see the Rejected.........: line within your status) all passwords which do not adhere to this limita...
philsmd hashcat 1 3,201 09-04-2017, 10:45 AM
    Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash

As already mentioned above, the hash algorithm itself determines where/how the password candidates are generated for mask attacks (-a 3). The hashcat source code distinguishes between ATTACK_EXEC_INS...
philsmd hashcat 8 21,165 09-03-2017, 07:33 PM
    Thread: How to run the program to find a hash/Помогите запустить хешке
Post: RE: How to run the program to find a hash/Помо...

You can download the intel OpenCL CPU driver here: https://software.intel.com/en-us/articles/opencl-drivers#latest_CPU_runtime for your 430m CPU. the GPU is way too old.
philsmd hashcat 6 7,224 09-02-2017, 12:07 PM
    Thread: Speed of crack for WPA/WPA2 hash
Post: RE: Speed of crack for WPA/WPA2 hash

The short answer is: I/O You shouldn't underestimate how slow it is to read from disk compared to e.g. generating the password candidates with rule/mask engine directly on GPU (fast hashes). For slo...
philsmd hashcat 8 21,165 09-02-2017, 08:40 AM
    Thread: Plain Vmware image setup - anyone?
Post: RE: Plain Vmware image setup - anyone?

I don't think that using a vmware image is an easy solution for your problem. With virtualization you need the virtualization system to support having full access to your hardware (in this case the...
philsmd hashcat 5 4,927 08-31-2017, 08:54 AM
    Thread: 1password agilebits conversion - doesn't match sample?
Post: RE: 1password agilebits conversion - doesn't match...

The format for hashcat is just: decimal_iteration_count:hexadecimal_salt:hexadecimal_digest you could just read the encryptionKeys.js file (and base64 convert the salt and digest) or use some othe...
philsmd hashcat 3 3,947 08-30-2017, 06:27 PM
    Thread: Office and --show option
Post: RE: Office and --show option

If you want to output the cracked hashes with -m 9820 you need to use the orginal hash file that you use to crack with -m 9820 (this is not only true for -m 9820, but for all hash types). So if you...
philsmd hashcat 6 5,802 08-28-2017, 07:26 AM
    Thread: 15200 Blockchain, My Wallet, V2 help
Post: RE: 15200 Blockchain, My Wallet, V2 help

Use this python script to extract the "hash" from your wallet file: https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/blockchain2john.py Don't forget to either remove...
philsmd hashcat 1 3,046 08-26-2017, 07:38 AM
    Thread: hashcat stops after about 37 minutes
Post: RE: hashcat stops after about 37 minutes

Hey @patpro. Thank you for the report. It seems devs now were able to reproduce this problem and fix it (https://github.com/hashcat/hashcat/commit/688a580d6c8c29b2525d905cb4ae1b688fc8fba7). Please ...
philsmd hashcat 22 17,111 08-25-2017, 08:56 PM
    Thread: A good hash ???
Post: RE: A good hash ???

We already explained this to you here: https://hashcat.net/forum/thread-6609-post-36090.html#pid36090 axcrypt2john.py includes the file name and hashcat doesn't need that. either use --username o...
philsmd hashcat 1 2,126 08-25-2017, 08:52 PM
    Thread: --limit and --skip usage
Post: RE: --limit and --skip usage

your examples above have 2 different masks: you used ?l?l?l?l?l?l?l?l for the keyspace calculation and ?l?l?l?l?l?l?l? for the actual run. You should always use the same mask! Furthermore, yo...
philsmd hashcat 2 2,896 08-25-2017, 12:24 PM
    Thread: Office and --show option
Post: RE: Office and --show option

The problem should be fixed with newest beta version: https://hashcat.net/beta/ The output of --show should now be correct (remember: you need to use the correct -m modes i.e. 9810 and not 9800, ot...
philsmd hashcat 6 5,802 08-25-2017, 10:11 AM
    Thread: Office and --show option
Post: RE: Office and --show option

You forgot to also include the command you execute for -m 9820. It also must contaiin the --username switch. It probably should be without "$HEX[" and "]''. could be indeed a bug but from your out...
philsmd hashcat 6 5,802 08-25-2017, 07:12 AM
    Thread: ERROR: Use of -r/--rules-file and -g/--rules-generate only allowed in attack mode 0.
Post: RE: ERROR: Use of -r/--rules-file and -g/--rules-g...

Within this video hashcat-legacy (https://github.com/hashcat/hashcat-legacy) is being used and not the new hashcat. Yeah, 2 of the differences we notice here between hashcat-legacy and hashcat is t...
philsmd hashcat 4 4,702 08-24-2017, 08:46 PM
    Thread: ERROR: Use of -r/--rules-file and -g/--rules-generate only allowed in attack mode 0.
Post: RE: ERROR: Use of -r/--rules-file and -g/--rules-g...

you need to use -a 0 to use --rules-file (or short -r). The same is true for --rules-generate (or short -g), it is only supported with straight/dictionary attack (-a 0).
philsmd hashcat 4 4,702 08-24-2017, 08:23 PM
    Thread: hashcat stops after about 37 minutes
Post: RE: hashcat stops after about 37 minutes

https://hashcat.net/beta/
philsmd hashcat 22 17,111 08-23-2017, 08:01 PM
    Thread: multi charset
Post: RE: multi charset

1. it's not allowed to post hashes 2. you need to specify a mask (see https://hashcat.net/wiki/?id=mask_attack) if you use -a 3 (otherwise the default one will be used, which is probably not exactly ...
philsmd hashcat 3 4,680 08-23-2017, 03:15 PM
    Thread: Scrypt + Salsa20/8 128 128
Post: RE: Scrypt + Salsa20/8 128 128

I just did several test with scrypt (even the "pleaseletmein" test) and I found no problem cracking scrypt with hashcat. Could you please be more specific. What do you mean by "still unable to crac...
philsmd hashcat 7 8,171 08-23-2017, 08:37 AM