Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

Search Results
Post Author Forum Replies [desc] Views Posted
    Thread: Parameters for crack ETH wallet password
Post: RE: Parameters for crack ETH wallet password

before starting a long running cracking job I would suggest to first make sure that your restrictions about the password candidates are correct and that your expected/test password candidates are even...
philsmd hashcat 4 3,253 09-30-2018, 09:12 AM
    Thread: brain-server
Post: RE: brain-server

there was a problem with starting the hashcat brain with version 5.0.0 on windows (see https://github.com/hashcat/hashcat/issues/1738#issuecomment-434274579). This problem is already fixed and the la...
philsmd hashcat 4 4,680 11-19-2018, 11:46 AM
    Thread: Won't start cracking (beginner)
Post: RE: Won't start cracking (beginner)

are you sure you installed the driver correctly? please use these instructions: https://hashcat.net/wiki/doku.php?id=frequently_asked_questions#i_may_have_the_wrong_driver_installed_what_should_i_do ...
philsmd Hardware 4 3,801 11-25-2018, 09:56 PM
    Thread: hashcat iconv
Post: RE: hashcat iconv

if I generate a md5 hash with your input $HEX[706f657a6965] I get a completely separate result: Code: -- printf "po\xebzie" |iconv -f "iso8859-1" -t "ASCII//TRANSLIT" | md5sum 5453454a253f8840811...
philsmd hashcat 4 2,981 12-07-2018, 01:25 PM
    Thread: hashcat iconv
Post: RE: hashcat iconv

well, I'm still not sure if 278fbfac8b69dda968b190e6bb1f4ac9 is the correct hash for your plain. I guess you do not know the password at all (which is bad since it would be a reason to ban you, but I'...
philsmd hashcat 4 2,981 12-07-2018, 06:40 PM
    Thread: clGetPlatformIDs(): CL_PLATFORM_NOT_FOUND_KHR problem
Post: RE: clGetPlatformIDs(): CL_PLATFORM_NOT_FOUND_KHR ...

please follow this guide https://hashcat.net/faq/wrongdriver
philsmd hashcat 4 9,115 12-19-2018, 04:19 PM
    Thread: helpme ^^)
Post: RE: helpme ^^)

hashes were removed. users were banned. follow the forum rules. damnit see https://hashcat.net/forum/announcement-2.html
philsmd hashcat 4 2,380 01-05-2019, 05:10 PM
    Thread: What make the hashrate so huge different?
Post: RE: What make the hashrate so huge different?

well, hccapx files as you can see here https://hashcat.net/wiki/doku.php?id=hccapx can consist of several networks/handshakes etc. if you crack several networks at the same time with -m 2500 = WPA/WPA...
philsmd hashcat 4 2,716 01-15-2019, 07:05 PM
    Thread: Need help on cracking veracrypt hidden partition
Post: RE: Need help on cracking veracrypt hidden partiti...

[update]: undeath was once again faster to answer the questions. he of course gives very good advice so read his suggestions too. I will leave my reply here anyways, maybe it adds just a little bit mo...
philsmd hashcat 4 2,770 12-31-2018, 11:57 AM
    Thread: Hashcat failing when hashes.txt has multiple different hashes in it
Post: RE: Hashcat failing when hashes.txt has multiple d...

as the above mentioned wiki post explains, you need to use --show --username and the original hash lists: Code: -- hashcat -m x --show --username hashes.txt -- where x must be replaced with th...
philsmd hashcat 4 2,495 01-18-2019, 09:58 AM
    Thread: Help explain the PBKDF2-HMAC-SHA1 hash-example
Post: RE: Help explain the PBKDF2-HMAC-SHA1 hash-example

the format is: sha1:[iteration count]:[salt in base64]:[digest in base64] therefore the hash is: sha1:1000:dGVzdA==:imirsGNFG+sMgaiy16fwPgWE3rY= this can be cracked with: Code: -- hashcat ...
philsmd hashcat 4 2,620 02-11-2019, 10:59 PM
    Thread: Extract all passwords from potfile
Post: RE: Extract all passwords from potfile

that's incorrect. --show only considers the hashes matching the current hash type and hash list (hash.txt): Code: -- hashcat -m 0 --show --outfile-format 2 hash.txt --
philsmd hashcat 4 3,187 02-16-2019, 03:34 PM
    Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512

1. why are you trying to crack the hash? can't you just replace the hash with a known hash and login ? Is it important that you know the password ? 2. your rule command/syntax is completely wrong. yo...
philsmd hashcat 4 3,707 02-20-2019, 10:07 AM
    Thread: help cracking PBKDF2-SHA512
Post: RE: help cracking PBKDF2-SHA512

1. what is your goal here? do you need to do forensic analysis or just need to get your data back and login ? I think if you are not using full-disk-encryption you could trick the system by giving it ...
philsmd hashcat 4 3,707 02-20-2019, 10:52 PM
    Thread: Command error
Post: RE: Command error

I think this is a problem of quotation marks "" vs '' I think windows only accepts "" as quotation for parameters The normal hashcat command is like this: Code: -- hashcat64.exe -m 14800 -...
philsmd hashcat 4 2,207 03-21-2019, 01:49 PM
    Thread: What am I doing wrong here?
Post: RE: What am I doing wrong here?

well, you also need to show us your command line and mask file. without that we can't really understand what you are doing over there.
philsmd hashcat 4 2,202 04-04-2019, 07:35 PM
    Thread: What am I doing wrong here?
Post: RE: What am I doing wrong here?

you need to define the custom charset within the mask file, see https://hashcat.net/faq#what_is_a_hashcat_mask_file and https://hashcat.net/wiki/?id=mask_attack#hashcat_mask_files therefore the com...
philsmd hashcat 4 2,202 04-04-2019, 07:53 PM
    Thread: Toogle case generator problem
Post: RE: Toogle case generator problem

you can toogle all 10 (0-9) + 26 (A-Z) = 36 positions (from index 0 to 35) with the following rules T0 T1 T2 T3 T4 T5 T6 T7 T8 T9 TA TB TC TD TE TF TG TH TI TJ TK TL TM TN TO TP TQ TR TS TT TU TV ...
philsmd hashcat 4 2,028 04-05-2019, 10:35 PM
    Thread: PBKDF2 and SHA-1 question
Post: RE: PBKDF2 and SHA-1 question

https://github.com/hashcat/hashcat/blob/773dab91616df1088b5887623547ab2bde80d9ba/tools/test_modules/m16800.pm#L40-L58 256 bits are 32 bytes (32 * 8 = 256)
philsmd hashcat 4 2,385 04-06-2019, 10:58 PM
    Thread: Slow bcrypt
Post: RE: Slow bcrypt

the cost factor is encoded in the hash The example hash for instance starts with "$2a$05$" (hashcat -m 3200 --example-hashes) and therefore has an exponent of 5 (cost factor) and therefore uses 2^...
philsmd hashcat 4 2,604 04-15-2019, 12:17 PM