Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum [asc] Replies Views Posted
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

It is the device password! If I change my pin to 8 digits there is a very slight change: length="8" ... numeric="8" ... nonletter="8" It seems fun, but it really isn't. For shame!!! Anyone can confir...
philsmd User Contributions 47 208,553 04-12-2013, 12:02 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

It seems to log into a rooted device you only need to *remove* this policy file and reboot: https://www.digitalmobile.in/community/threads/remove-pattern-lock-of-any-android-device.1893/ EDIT: But o...
philsmd User Contributions 47 208,553 04-12-2013, 12:25 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

Some examples for "salt conversion" for those that are not sure how to get the hex string, the steps are easy, but were not descibed in detail. Of course this conversion is easy, but maybe someone di...
philsmd User Contributions 47 208,553 04-12-2013, 03:33 PM
    Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat

Amazing speeds! Great, thx for the port and update here
philsmd User Contributions 7 23,945 04-22-2013, 01:03 PM
    Thread: Breaking AIX hashes with hashcat
Post: RE: Breaking AIX hashes with hashcat

Hi guys, thx @atom, and here are the details, it is (partially) too easy to be true and not understandable why nobody else came up with this details b4 ;-): - smd5 uses md5_crypt basically - ssha* var...
philsmd User Contributions 7 23,945 04-20-2013, 10:34 PM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

You just need to make the base conversion.... instead of base 10 (the numeric scale we most of the time use), here we/I did use (but ofc it is not striclty necessary) base 2 (to show what happens w/ t...
philsmd User Contributions 47 208,553 01-09-2014, 03:03 PM
    Thread: Problem with performance
Post: RE: Problem with performance

Please read here: https://hashcat.net/trac/ticket/368#comment:3
philsmd User Contributions 4 11,407 03-05-2014, 08:59 PM
    Thread: Sapphire R2 290 benchmark
Post: RE: Sapphire R2 290 benchmark

What regards the hang, did you use this registry patch for the driver timeout? https://hashcat.net/wiki/doku.php?id=timeout_patch
philsmd User Contributions 2 7,210 07-13-2014, 06:14 PM
    Thread: Breaking Notes/Domino 8+ H-hashes
Post: Breaking Notes/Domino 8+ H-hashes

So recently we added support for Lotus Notes/Domino 8 hashes (-m 9100). Since we know that many of you are interested in the details about this hash algorithm, I will try to explain the algo here. It...
philsmd User Contributions 2 21,691 07-19-2014, 12:03 AM
    Thread: Android Full Disk Encryption
Post: RE: Android Full Disk Encryption

I added to the wiki an example hash for -m 8800. Please see https://hashcat.net/wiki/doku.php?id=example_hashes , file: hashcat.android43fde Password is like for all other samples "hashcat". I extra...
philsmd User Contributions 13 55,415 09-13-2014, 12:56 PM
    Thread: Help with Hash
Post: RE: Help with Hash

No. According to the forum rules you've accepted you are not allowed to post hashes. You will be banned for 1 week and this thread will be closed. After the 1 week off, you hopefully did unders...
philsmd User Contributions 1 4,788 10-20-2014, 09:40 AM
    Thread: Details about new SAP CODVN H - Iterated random-salted passwords (PWDSALTEDHASH)
Post: RE: Details about new SAP CODVN H - Iterated rando...

Great. Very well done. But there is a very important thing you missed in your nice description: as far as we know oclHashcat is the first cracker to support cracking those sap h hashes :P No ...
philsmd User Contributions 2 17,852 11-04-2014, 12:06 AM
    Thread: Details about new Cisco algos ($8$ = -m 9200 and $9$ = -m 9300)
Post: Details about new Cisco algos ($8$ = -m 9200 and $...

Remember the two "new" hash types that we've announced in August this year? I'm speaking about the 2 new hash types used in some new Cisco routers with latest firmware, one of which is pbkdf2-hmac-sh...
philsmd User Contributions 0 8,213 11-03-2014, 05:36 PM
    Thread: PBKDF2 new format hash
Post: RE: PBKDF2 new format hash

Thanks for the links. But please (as said) stick to the ticket https://hashcat.net/trac/ticket/256 , otherwise we need to cross-post everything and devs need to look for the required information on...
philsmd User Contributions 3 9,610 01-23-2015, 11:57 AM
    Thread: PBKDF2 new format hash
Post: RE: PBKDF2 new format hash

Why do you not write your comments on trac directly? What regards the trac ticket, I was asking for more details and where this hash type is being used (common CMS, other software etc) but we didn't ...
philsmd User Contributions 3 9,610 01-21-2015, 10:02 AM
    Thread: Third-party utility: analyze_hccap
Post: Third-party utility: analyze_hccap

analyze_hccap is a new small perl script I developed which sometimes can be very handy to analyze the content of .hccap files (for -m 2500 = WPA cracking, see https://hashcat.net/wiki/doku.php?id=hcca...
philsmd User Contributions 3 7,990 01-28-2015, 11:40 AM
    Thread: Third-party utility: analyze_hc_restore
Post: Third-party utility: analyze_hc_restore

analyze_hc_restore is a perl script I have developed that can be very handy to help analyze and mofify oclHashcat .restore files ( https://hashcat.net/wiki/doku.php?id=oclhashcat#parsing_the_restore-f...
philsmd User Contributions 3 7,403 01-28-2015, 11:45 AM
    Thread: [.Net 4.5] Leukocyte_GUI_for_oclHashcat (GUI wrapper)
Post: RE: [.Net 4.5] Leukocyte_GUI_for_oclHashcat (GUI w...

Very nice design indeed. Thank you very much for the contribution
philsmd User Contributions 19 35,842 02-27-2015, 12:49 AM
    Thread: Breaking Samsung Android Passwords/PIN
Post: RE: Breaking Samsung Android Passwords/PIN

All formats (also -m 5800) are explained here: https://hashcat.net/wiki/doku.php?id=example_hashes For -m 5800 for instance it is important that the hash (and most importantly the salt) is in lower-c...
philsmd User Contributions 47 208,553 03-03-2015, 02:41 PM
    Thread: 7z2hashcat
Post: RE: 7z2hashcat

Thanks for the report. I did fix it here: https://github.com/philsmd/7z2hashcat/commit/64ac67c42e72d0573fb84098df3699526876209d But I am unsure why it enters that specific section in your case (e.g...
philsmd User Contributions 28 70,367 04-28-2015, 07:57 AM