Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [desc] Replies Views Posted
    Thread: Line-length exception....
Post: RE: Line-length exception....

No. No. No. I do not agree that the problem of cqdx has anything to do with what was original reported by the original reporter (OP). I do not agree that we should steal threads like this. I do not...
philsmd hashcat 30 23,352 01-16-2018, 11:07 PM
    Thread: Electrum support - aes_decrypt (sha256 (sha256 ($pass), $data)
Post: RE: Electrum support - aes_decrypt (sha256 (sha25...

different salt type implies ("slightly") different algorithm (as far as I know) The output of electrum2john will be different for different salt types. I.e. $electrum$1 means that salt-type 1 is b...
philsmd hashcat 32 25,733 02-03-2018, 01:34 PM
    Thread: Haschat cracked a password but how can I print out it?
Post: RE: Haschat cracked a password but how can I print...

It is explained for instance here: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#how_can_i_show_previously_cracked_passwords_and_output_them_in_a_specific_format_eg_emailpassword ...
philsmd hashcat 2 2,634 02-03-2018, 03:47 PM
    Thread: [mp64] Output Results with Max/Exact Number of Chars of Specified Charsets
Post: RE: [mp64] Output Results with Max/Exact Number of...

I think this is similar to what we do with policygen of PACK, i.e. using hashcat mask files (.hcmask) directly with hashcat.
philsmd hashcat 2 2,649 02-06-2018, 08:38 AM
    Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5

It does. It looks if that specific process id found within the hashcat.pid file is still running. Since tea-er's pid is strangely pid 5 (wtf ?) it might be the case that it always finds a pid with pi...
philsmd hashcat 7 10,362 02-06-2018, 08:53 PM
    Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...

In general (if we do not look at ethereum pre-sale) it's not always the case that only by having found the password corresponding to a certain hash you can access data of the owner of the hash (if no ...
philsmd hashcat 4 3,766 01-20-2018, 10:58 PM
    Thread: Hashcat is showing wrong password
Post: RE: Hashcat is showing wrong password

maybe the document can be opened without problem and without password but there are other protections in place like copy/print protection etc.
philsmd hashcat 10 8,001 02-08-2018, 06:49 PM
    Thread: I can not determine the number in the hashcat
Post: RE: I can not determine the number in the hashcat

does the example hash work for you? are you sure you are using the correct hash type? you need to use -m 12700
philsmd hashcat 10 8,863 02-11-2018, 09:35 AM
    Thread: "Getting Help from Friends" -- Reverse my hash?
Post: RE: "Getting Help from Friends" -- Reverse my hash...

This discussion would also be interesting here: https://hashcat.net/forum/thread-6405-post-39256.html#pid39256 Basically, if you can reveal at least the last 2 blocks (2*16 bytes = 32 bytes) of the...
philsmd hashcat 4 3,766 02-11-2018, 07:20 PM
    Thread: Hybrid Attack
Post: RE: Hybrid Attack

This is a warning. It is not an error message. With a larger wordlist and/or mask you will reach full speed. With a too small wordlist/mask hashcat can't use the full acceleration.
philsmd hashcat 3 3,011 02-12-2018, 10:48 PM
    Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key

it's not allowed to post hashes. The encryption used by the PDF algorithm uses a 128 bit key. This key is derived by a key-derivation-function and will be generated from your password as an inpu...
philsmd hashcat 4 4,061 02-12-2018, 10:51 PM
    Thread: brute forcing sha256 - need help locating salt in open source code
Post: RE: brute forcing sha256 - need help locating salt...

PasswordHash does not seem to use AES (or any other type of decryption) at all. It seems to be just sha256 (sha256 (sha256 ($pass))) and therefore tripple sha256 I do not have an example hash, ...
philsmd hashcat 8 6,872 02-13-2018, 12:18 AM
    Thread: Please help with mask for 128 bit pdf key
Post: RE: Please help with mask for 128 bit pdf key

You can't use a collider mode for pdf versions that can't be attack with that method (it's only possible for old pdf versions). Mask attack is in general not a good strategy to recover a password f...
philsmd hashcat 4 4,061 02-13-2018, 12:04 PM
    Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5

I'm not sure exactly what the problem is and why a second instance is still running. Anyways, to solve it you just need to stop the second instance (either via job control - or "task manager"-like ...
philsmd hashcat 7 10,362 02-06-2018, 05:50 PM
    Thread: Already an instance running on pid 5
Post: RE: Already an instance running on pid 5

Please do one of the following actions: 1. after stopping your current running hashcat instance (the one with --session etc), delete the file "hashcat.pid" from the main hashcat folder 2. copy all y...
philsmd hashcat 7 10,362 02-06-2018, 08:41 PM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

You basically already answered your own question by explaining the algorithm details and linking to the algorithm description. Furthermore, this question was already recently addressed within this fo...
philsmd hashcat 26 24,603 02-10-2018, 07:39 PM
    Thread: rules file support in attack mode 3
Post: RE: rules file support in attack mode 3

If the keyspace of the mask that you want to duplicate is very slow (as in your case just 10000 password candidates), you could just store these password candidates to a dictionary file and use the di...
philsmd hashcat 6 5,814 02-15-2018, 10:30 AM
    Thread: +55 minutes in Generating Dictionary for 194GB
Post: RE: +55 minutes in Generating Dictionary for 194GB

Yeah, thx undeath. When re-reading my post (after posting, hehe), I also discovered that this phrasing was not very clever and I should have added that whenever you reveal the whole seed, that the pri...
philsmd hashcat 26 24,603 02-11-2018, 02:49 PM
    Thread: WPA and first hash
Post: RE: WPA and first hash

https://hashcat.net/forum/thread-6355-post-33892.html#pid33892 https://github.com/hashcat/hashcat/issues/1167
philsmd hashcat 2 2,750 02-27-2018, 05:58 PM
    Thread: include SHA1 Hash with the results
Post: RE: include SHA1 Hash with the results

you can use --left to show all hashes that are not cracked yet and --show to show all hashes that are already cracked with the corresponding passwords (see: https://hashcat.net/wiki/doku.php?id=freque...
philsmd hashcat 1 1,916 02-27-2018, 06:51 PM